Intrusion detection model based on selective packet sampling
نویسندگان
چکیده
منابع مشابه
Intrusion detection model based on selective packet sampling
Recent experimental work by Androulidakis and Papavassiliou (IET Commun 2(3):399, 2008; IEEE Netw 23(1):6, 2009) has shown that it is possible to maintain a high level of network security while selectively inspecting packets for the existence of intrusive activity, thereby resulting in a minimal amount of processing overhead. In this paper, a statistical approach for the modeling of network int...
متن کاملAn Intrusion Detection System for MANET Against Selective Packet Dropping
A MANET (mobile ad hoc network) is a self-configuring infrastructure-less network of mobile devices connected through a wireless medium. All the devices in MANET can move independently in any direction and frequently change its link to other devices. Each device can act as both a transmitter and receiver therefore MANET doesn't require a fixed network infrastructure. Self-configuring abili...
متن کاملmortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولOn Effective Model-Based Intrusion Detection
Model-based intrusion detectors restrict program execution to a previously computed model of expected behavior. We consider two classes of attacks against these systems: bypass attacks that evade detection by avoiding the detection system altogether, and transformational attacks that alter a detected attack into a semantically-equivalent attack that goes undetected. Recent detection approaches ...
متن کاملIntrusion Detection Based on Hidden Markov Model
The intrusion detection technologies of the network security are researched, and the tec<nologies of pattern recognition are used to intrusion detection. lnhusion detection rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. Hidden Markov Model (HMM) has been successfully used in speech recognition and some classification areas. Since Anomaly...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EURASIP Journal on Information Security
سال: 2011
ISSN: 1687-417X
DOI: 10.1186/1687-417x-2011-2