نتایج جستجو برای: network intrusion detection

تعداد نتایج: 1198390  

2014
Hussain Ahmad Madni Uppal Memoona Javed M. J. Arshad

The area of intrusion detection is the central concept in overall network and computer security architecture. It is an important technology in business sector as well as in research area. By monitoring the computer and network resources, Intrusion Detection System (IDS) detects any of the misuse or unauthorized access which is basically an attack to these resources. Then it alerts and informs a...

2013
Dr. M. V. Siva K. Babu Rao

The Computer Security is a part of Computer Science that addresses all the problems that exists within the computer security domain. Now days, more than ever, the computer viruses, worms, hackers, crackers, electronic eavesdropping and electronic fraud, have become the new problems that the Network Computer Security Science must solve. The Intrusion Detection System has become a needful compone...

2016
Tichun Wang Hongyang Zhang Lei Tian Bin Tan Yang Tan Yuanxu Li

With the rapid development of Internet, the network topology structure becomes more and more complex, so that the monitoring of network attack has become quite difficult. The traditional passive defence strategy has been unable to meet the demand of network information security. How to effectively detect and prevent the network intrusion have become an important matter in the field of computer ...

2015
M. Tubaishat

Wireless Sensor Networks (WSNs) have been employed in many real-world applications that greatly improve our life. by applying a genetic operator. However, the Intrusion detection systems in wireless sensor networks: A review. Intrusion Detection System (IDS) provides a solution to this problem by analysing the network in order to detect abnormal behaviour of the sensor node(s). A well designed ...

2014
Kamini Nalavade B. B. Meshram

With the growth of hacking and exploiting tools and invention of new ways of intrusion, Intrusion detection and prevention is becoming the major challenge in the world of network security. The increasing network traffic and data on Internet is making this task more demanding. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not ...

2013
Sherif M. Badr

Intrusion Detection System (IDS) is one of a crucial issue and a major research problem in network security. This work, An Adaptive multi-Layer Intrusion Detection System (ALIDS) is designed and developed to achieve high efficiency, scalability, flexibility and improve the detection and classification rate accuracy. We apply C5 decision tree on our model. Our experimental results showed that th...

Journal: :Transactions on Computer Systems and Networks 2021

Network operators are generally aware of common attack vectors that they defend against. For most networks, the vast majority traffic is legitimate. However, new continually designed and attempted by bad actors which bypass detection go unnoticed due to low volume. One strategy for finding such activity look anomalous behavior. Investigating behavior requires significant time resources. Collect...

Journal: :JNW 2010
Rung Ching Chen Chia-Fen Hsieh Yung-Fa Huang

A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor environmental conditions, such as battlefield data and personal health information, and some environment limited resources. To avoid malicious damage is important while information is transmitted in wireless network. Thus, Wireless Intrusion Detecti...

2015
Mohamed Elboukhari Mostafa Azizi Abdelmalek Azizi

Mobile Ad Hoc Networks (MANETs) are more vulnerable to different attacks. Prevention methods as cryptographic techniques alone are not sufficient to make them secure; therefore, efficient intrusion detection must be deployed and elaborated to facilitate the identification of attacks. An Intrusion Detection System (IDS) aims to detect malicious and selfish nodes in a network. The intrusion detec...

1999
Jungwon Kim Peter Bentley

This paper presents a negative selection algorithm with niching by an artificial immune system, for network intrusion detection. The paper starts by introducing the advantages of negative selection algorithm as a novel distributed anomaly detection approach for the development of a network intrusion detection system. After discussing the problems of existing approaches using negative selection ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید