Performance Evaluation of a Smart Intrusion Detection System (IDS) Model
نویسندگان
چکیده
منابع مشابه
Intrusion Detection System (IDS) Evaluation
This paper describes a set of metrics that will help administrators of distributed, real-time (clustered) computer facilities to select the best intrusion detection system for their facilities. The metrics herein are the subset of our general metric set that particularly impact real-time and distributed processing issues. We discuss related works in this field, the role of intrusion detection i...
متن کاملImportance of Intrusion Detection System (IDS)
Intruders computers, who are spread across the Internet have become a major threat in our world, The researchers proposed a number of techniques such as (firewall, encryption) to prevent such penetration and protect the infrastructure of computers, but with this, the intruders managed to penetrate the computers. IDS has taken much of the attention of researchers, IDS monitors the resources comp...
متن کاملIDS/A: An Interface between Intrusion Detection System and Application
We describe a number of problems which may reduce the effectiveness of a conventional network intrusion detection system. These problems are the result of the IDS having to second-guess the components or applications it is protecting. We propose a bi-directional interface between IDS and application. Applications use this interface to describe their state and submit their actions for approval t...
متن کاملMOVIH-IDS: A mobile-visualization hybrid intrusion detection system
A novel hybrid artificial intelligent system for Intrusion Detection, called MOVIH-IDS, is presented in this study. A hybrid model built by means of a multiagent system that incorporates an unsupervised connectionist Intrusion Detection System (IDS) has been defined to guaranty an efficient computer network security architecture. This hybrid IDS facilitates the intrusion detection in dynamic ne...
متن کاملA recommended framework for anomaly intrusion detection system (IDS)
Signature-based solutions for Intrusion Detection are dominant in practice despite of its incapability to detect zero-day attacks. Moreover, anomaly-based Intrusion Detection Systems (IDS), a promising approach against both known and unknown attacks, are not mature for a broad productive use. Therefore, the further development of anomaly based IDS is an imperative task to strengthen security in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: European Journal of Engineering and Technology Research
سال: 2021
ISSN: 2736-576X
DOI: 10.24018/ejers.2021.6.2.2371