Intrusion Detection System Inside Grid Computing Environment (IDS-IGCE)
نویسندگان
چکیده
منابع مشابه
Intrusion Detection System (IDS) Evaluation
This paper describes a set of metrics that will help administrators of distributed, real-time (clustered) computer facilities to select the best intrusion detection system for their facilities. The metrics herein are the subset of our general metric set that particularly impact real-time and distributed processing issues. We discuss related works in this field, the role of intrusion detection i...
متن کاملImportance of Intrusion Detection System (IDS)
Intruders computers, who are spread across the Internet have become a major threat in our world, The researchers proposed a number of techniques such as (firewall, encryption) to prevent such penetration and protect the infrastructure of computers, but with this, the intruders managed to penetrate the computers. IDS has taken much of the attention of researchers, IDS monitors the resources comp...
متن کاملThe Research Of Intrusion Detection System In Cloud Computing Environment
This paper analyzes real-time intrusion response systems in order to mitigate attacks that compromise integrity, confidentiality and availability. In this article we explain exactly what an Intrusion Detection System, why you need one IT Whitepapers Get the latest business IT research and intelligence. Cloud computing is one of the most important technologies in the world right now, but it whic...
متن کاملClassifier Selection Models for Intrusion Detection System (ids)
Any abnormal activity can be assumed to be anomalies intrusion. In the literature several techniques and algorithms have been discussed for anomaly detection. In the most of cases true positive and false positive parameters have been used to compare their performance. However, depending upon the application a wrong true positive or wrong false positive may have severe detrimental effects. This ...
متن کاملDesign and Implementation of Intrusion Detection System ( Ids ) Sensor Deployment
Network intrusion detection systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software-based network intrusion detection systems have difficulty in handling high speed links. This paper describes the design and implementation of a highperformance network intrusion detection system that com...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Grid Computing & Applications
سال: 2011
ISSN: 2229-3949
DOI: 10.5121/ijgca.2011.2403