نتایج جستجو برای: intrusion detection systems ids

تعداد نتایج: 1700198  

2015
Ismail Butun In-ho Ra Ravi Sankar

In this work, an intrusion detection system (IDS) framework based on multi-level clustering for hierarchical wireless sensor networks is proposed. The framework employs two types of intrusion detection approaches: (1) "downward-IDS (D-IDS)" to detect the abnormal behavior (intrusion) of the subordinate (member) nodes; and (2) "upward-IDS (U-IDS)" to detect the abnormal behavior of the cluster h...

2005
Frédéric Massicotte Mathieu Couture Annie De Montigny-Leboeuf

Since the DARPA Intrusion Detection Evaluation Data Set [2] was made available in 1998, and then updated in 1999 and 2000, it seems that no other significant freely available data sets have been provided to allow benchmarking of Intrusion Detection Systems (IDS). Even if those traffic traces are still used by the security research community, they have not been updated since. The absence of addi...

2007
Chunsheng Li Qingfeng Song Chengqi Zhang

Distributed intrusion detection systems (IDS) have many advantages such as scalability, subversion resistance, and graceful service degradation. However, there are some impediments when they are implemented. The mobile agent (MA) technology is of many features to suit the implementation of distributed IDS. In this paper, we propose a novel architecture _•• MA·IDS with MA technology for distribu...

2013
M. Eid H. Artail A. Kayssi A. Chehab

This paper presents a distributed intrusion detection system (IDS) based on mobile agents that detect intrusion from outside the network segment as well as from inside. A main machine, being a typical intrusion detection system residing at a secure location, creates agents and dispatches them into the network. On each hop, the agents sniff the network traffic and look for abnormal activities by...

2016
Nilofer Shoaib Khan Umesh Lilhore

In the field of Information technology security plays a vital role. Unauthorized entries or any anomalies in system are known as intrusion and detection of these anomalies are known as Intrusion Detection System (IDS). As the attacks have increased in huge numbers over the past few years, IDS is increasingly becoming a critical component to secure the network. Designing of an efficient Intrusio...

2012
Yogesh Kumar Swati Dhawan

An Intrusion Detection System (abbreviated as IDS) is a defense system, which detects hostile activities in a network. The key is then to detect and possibly prevent activities that may compromise system security, or a hacking attempt in progress including reconnaissance/data collection phases that involve for example, port scans. One key feature of intrusion detection systems is their ability ...

2016
Anthony Raj

Information security is a vital aspect of any organization. Most of the organizations relay and trust on the intrusion Detection System (IDS) which play important role in detecting intrusions in data network environment. The design of IDS varies with implementation of different IDS techniques involved. The design of IDS techniques keep changes as the trend of data network innovative attack meth...

2012
Amin Hassanzadeh Zhaoyan Xu Radu Stoleru Guofei Gu

As interest in wireless mesh networks grows, security challenges, e.g., intrusion detection, become of paramount importance. Traditional solutions for intrusion detection assign full IDS responsibilities to a few selected nodes. Recent results, however, have shown that a mesh router cannot reliably perform full IDS functions because of limited resources (i.e., processing and memory). Cooperativ...

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

Journal: :CoRR 2010
Hamdan O. Alanazi Rafidah Md. Noor B. B. Zaidan A. A. Zaidan

Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM. ANN is one of the oldest systems that have been used for Intrusion Detection System (IDS), which presents supervised lea...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید