نتایج جستجو برای: intrusion response system
تعداد نتایج: 3050974 فیلتر نتایج به سال:
This paper proposes a new fuzzy logic approach to perform analysis and detection intrusion in 802.11 wireless networks. The algorithm consists of five steps: First, construct the networks and generate many cases of daily traffic and intrusion. In the same time, catch different values of system and network parameters and associate to them a potential degree of severity alarm. Second, generate fu...
Addressing security vulnerabilities and system intrusions can represent a significant administrative overhead in current computer systems. Although technologies exist for both vulnerability scanning and for intrusion detection, the problems typically require some form of human intervention before they can be rectified. Evidence suggests that, in many cases, this can lead to omissions or oversig...
In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS...
Owing to population growth and water demand, coastal aquifers all over the world are over–pumped, resulting in serious problems such as saltwater intrusion. So, in these conditions, assessing the groundwater system’s vulnerability and finding areas with saltwater intrusion potential are vital for the better management of aquifers. In this study, AHP-GALDIT was applied to saltwater intrusion vul...
background: there is no conclusive evidence on the effect of orthodontic force application on dental pulp tissue. the aim of this study was to compare early and delayed histological effects of intrusive forces on dental pulp of adolescents and adults. materials and methods: patients referred to the department of orthodontics of mashhad university of medical sciences participated in this study. ...
Intrusion Detection System (IDS) is used to detect intrusion and then alert the system administrator about the intrusion. This is what traditional IDS is all about. It is then up to the system administrator to deal with the intrusion. Human intervention is still needed when it comes to dealing with intrusion. This is because traditional IDS could only detect the intrusion but could not, on its ...
This paper analyzes the current situation of the intrusion detection system, which is the basis to put forward that data mining technology is to be applied to the intrusion detection system in terms of the problems of the traditional intrusion detection system. Meanwhile, the paper designs the intrusion detection model of data mining. With the study on intrusion detection and data mining, the a...
Disruption Tolerant Networks (DTNs) are considered to be a successful solution to allow communication between nodes in extreme networking environments. Cooperative caching is one of the best methods of data access in such conditions. One of the major challenges in this scenario is secure and efficient data transfer between nodes. Due to random nature of DTNs, harmful intruders can launch attack...
The goal of Distributed Intrusion Detection System is to analyze events on the network and identify attacks. The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS). There is a difficulty to find intrusion in an distributed network segment from inside as w...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید