Effective Intrusion Detection (White paper).pub

ثبت نشده
چکیده

The rapid growth in their use is largely based on the premise that any operational IT system is likely to be the subject of some form of attack, or reconnaissancetype activity, during its lifetime. Certainly, in the case of Internet-facing systems, many are likely to be probed, scanned and interrogated within the first few hours of being connected to a network. It’s important, also, to consider the decreasing lifespan of malicious attacks. A shrewd and determined attacker can easily scan a system for vulnerabilities, gain access to it, modify or remove information and then eradicate any trace of their actions in a matter of minutes. It really doesn’t take long.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

Intrusion Detection and Classification Using Improved ID3 Algorithm of Data Mining

Intrusion detection technology exists a lot of problems, such as low performance, low intelligent level, high false alarm rate, high false negative rate and so on. There is a need to develop some robust decision tree in order to produce effective decision rules from the attacked data. In this paper, ID3 decision tree classification method is used to build an effective decision tree for intrusio...

متن کامل

An Immunological Approach to Intrusion Detection

This paper presents an examination of intrusion detection schemes. It discusses traditional views of intrusion detection, and examines the more novel, but perhaps more effective, approach to intrusion detection as modeled on the human immune system. The discussion looks at some of the implications raised by intrusion detection research for information security in general.

متن کامل

Towards an Effective Intrusion Response Engine Combined with Intrusion Detection in Ad Hoc Networks

In this paper, we present an effective intrusion response engine combined with intrusion detection in ad hoc networks. The intrusion response engine is composed of a secure communication module, a local and a global response module. Its function is based on an innovative tree-based key agreement protocol while the intrusion detection engine is based on a class of neural networks called eSOM. Th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005