نتایج جستجو برای: network intrusion detection

تعداد نتایج: 1198390  

2007
Bharanidharan Shanmugam Norbik Bashah Idris

Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Artificial Intelligence plays a driving role in security services. This paper proposes a dynamic model Intelligent Intrusion Detection System, based on specific AI approach for intrusion detection. The techniques tha...

Journal: :CoRR 2011
Hichem Sedjelmaci Mohammed Feham

Network security is one of the major concerns of studies have been conducted on the intrusion detection system. Cluster-based Wireless A novel hybrid intrusion detection method method for wireless sensor networks. Accepted papers & International Conference on Advanced Wireless, Paper title:A Low-Complex Coverage Eligibility Algorithm For Wireless Sensor Networks. Paper title: A Novel Cluster He...

2013
Noor Suhana Sulaiman

Intrusion Detection System is significant in network security. It detects and identifies intrusion behavior or intrusion attempts in a computer system by monitoring and analyzing the network packets in real time. In the recent year, intelligent algorithms applied in the intrusion detection system (IDS) have been an increasing concern with the rapid growth of the network security. IDS data deals...

2002
MAHMOOD HOSSAIN

The goal of an intrusion detection system (IDS) is to identify authorized and unauthorized intruders by differentiating anomalous network activity from normal network traffic. Data mining methods have been used to build automatic intrusion detection systems. The central idea is to utilize auditing programs to extract a set of features that describe each network connection or host session, and a...

2013
M. Eid H. Artail A. Kayssi A. Chehab

This paper presents a distributed intrusion detection system (IDS) based on mobile agents that detect intrusion from outside the network segment as well as from inside. A main machine, being a typical intrusion detection system residing at a secure location, creates agents and dispatches them into the network. On each hop, the agents sniff the network traffic and look for abnormal activities by...

2009
Flora S. Tsai

Network intrusion detection includes identifying a set of malicious actions that compromise the integrity, confidentiality, and availability of information resources. The tremendous increase of novel cyber attacks has made data mining based intrusion detection techniques extremely useful in their detection. This paper describes a system that is able to detect network intrusion using association...

2013
Amit Bhardwaj Parneet Kaur

Assuring secure and reliable operation of networks has become a priority research area these days because of ever growing dependency on network technology. Intrusion detection systems (IDS) are used as the last line of defense. Intrusion Detection System identifies patterns of known intrusions (misuse detection) or differentiates anomalous network data from normal data (anomaly detection). In t...

2017
Anu Devi Sandeep Garg

1RESEARCH SCHOOLAR 2ASSISTANT PROFESSOR Dept. of Computer Science and Engineering RPIIT Karnal Haryana, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract Due increased growth of Internet; number of network attacks has been increased. Which emphasis needs for intrusion detection systems (IDS)...

2010
S. Saravanakumar

The current network is complicated due to the high throughput and the multi-uniformity of actions. An intrusion detection system is a critical component for secure information management. Network Intrusion Detection Systems, which are part of the layered defense scheme, must be able to meet these organizational objectives in order to be effective. This work presents the investigations carried o...

Journal: :JDCTA 2009
S. Janakiraman V. Vasudevan

Intrusion detection is a problem of great significance to protecting information systems security. An intruder may move between multiple nodes in the network to conceal the origin of attack. Distributed intrusion detection and prevention plays an increasingly important role in securing computer networks. To overcome the limitations of conventional intrusion detection systems, alerts are made in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید