نتایج جستجو برای: intrusion detection systems idss

تعداد نتایج: 1697787  

2001
Noria Foukia David Billard

During the last ten years, the Internet has grown considerably. More interconnected people yields increased information security problems. Indeed, the continuous increase in computer interconnectivity and interoperability in a fully open way enhances the intruder’s ability to attempt malicious behaviour against computers and networks and furthermore allows intruders to make these attempts extre...

2004
Yanxiang He Wei Chen Min Yang Wenling Peng

As malicious intrusions span sites more frequently, network security plays the vital role in internet. Intrusion detection system(IDS) is expected to provide powerful protection against malicious behaviors. However, high false negative and false positive prevent intrusion detection system from practically using. After survey of present intrusion detection systems, we believe more accurate and e...

Journal: :J. Internet Serv. Inf. Secur. 2012
Sang Min Lee Dong Seong Kim Jong Sou Park

Internet and computer networks are exposed to an ever increasing number of security threats that can damage computer systems and communication channels. Firewalls are used to defend systems but still they are not enough to provide full protection to the systems. Then, the concern with Intrusion Detection Systems (IDSs) has been growing for network security over the past years. Due to the increa...

2015
Adel Sabry EESA Zeynep ORMAN Adnan Mohsin Abdulazeez BRIFCANI

Intrusion detection systems (IDSs) have become a necessary component of computers and information security framework. IDSs commonly deal with a large amount of data traffic and these data may contain redundant and unimportant features. Choosing the best quality of features that represent all of the data and exclude the redundant features is a crucial topic in IDSs. In this paper, a new combinat...

2011
Sahar Selim Fouad Taymoor M. Nazmy Mohamed Hashem Mohamed Hashem Abdel-Aziz

II Acknowledgements Praise is to Allah and gratitude is given where it is due most to Allah. So with genuine humility, I acknowledge the aid of Allah. My deepest gratitude and sincerest appreciation to Prof. Dr. Mohamed Hashem Abdel-Aziz, for his continuous encouragement and enlightening advice and helpful advices, that helped me throughout this work. I feel greatly indebted to Prof. Dr. Taymoo...

2001
Noria Foukia Jarle G. Hulaas

During the last ten years, the Internet has grown considerably. More interconnected people yields increased information security problems. Indeed, the continuous increase in computer interconnectivity and interoperability in a fully open way enhances the intruder’s ability to attempt malicious behaviour against computers and networks and furthermore allows intruders to make these attempts extre...

Journal: :I. J. Network Security 2013
Mueen Uddin Azizah Abdul Rahman Naeem Uddin Jamshed Memon Raed A. Alsaqour Suhail Kazi

The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusions detection systems ( IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from so...

2013
Vineet Kumar Chaudhary Santosh Kumar Upadhyay

The Internet and computer networks are exposed to an increasing number of security threats. With new types of attacks appearing continually, developing flexible and adaptive security oriented approaches is a severe challenge. Intrusions detection systems ( IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from so...

2016
Mona Lange Felix Kuhr Ralf Möller

With the growing deployment of host-based and network-based intrusion detection systems in increasingly large and complex communication networks, managing low-level alerts from these systems becomes critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or intrusion prevention systems (IPSs) are collected throughout a monitored network such that...

Journal: :Expert Syst. Appl. 2015
Adel Sabry Eesa Zeynep Orman Adnan Mohsin Abdulazeez Brifcani

This paper presents a new feature-selection approach based on the cuttlefish optimization algorithm which is used for intrusion detection systems (IDSs). Because IDSs deal with a large amount of data, one of the crucial tasks of IDSs is to keep the best quality of features that represent the whole data and remove the redundant and irrelevant features. The proposed model uses the cuttlefish algo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید