نتایج جستجو برای: based intrusion detection

تعداد نتایج: 3328279  

2005
Zonghua Zhang

Anomaly-based intrusion detection is about discerning intrusive and normal patterns of activities based on the normality characterization of information systems. The common goal of anomaly-based intrusion detection is to detect intrusive attacks as many as possible with fewer false alerts. Generally, our work is to study effective models, methods and techniques for anomaly-based intrusion detec...

2012
Monika Darji Bhushan Trivedi

Intrusion Detection and Prevention System is a must for mobile ad networks as the security mechanisms like encryption, authentication and firewall systems are not able to completely secure the nodes and their communication. In this paper, we aim to study the various intrusion detection and prevention systems that were proposed for Mobile Adhoc Networks (MANETs) and compare the recent techniques...

2014
Bharat Rathi Dattatray V. Jadhav

The Particle Swarm Optimization is very efficient in intrusion detection in the networks. However, many intrusion detection systems either fail to detect or falsely detect the intrusions. This paper proposes a technique for intrusion detection using Particle Swarm Optimization with Genetic Algorithm based feature selection and using Adaptive Mutation for slow convergence of optimization algorit...

2016
Esra N. Yolacan David R. Kaeli

In this work, we describe a new framework for an anomaly-based intrusion detection system using system call traces. System calls provide an interface between an application and the operating system’s kernel. Since a program frequently requests services via system calls, a trace of these system calls provides a rich profile of program behavior. But we need to use efficient and effective methods ...

2005
Judit Gyimesi

Intrusion Detection Systems (IDS) are software or hardware systems, which automatically monitor network traffic looking for suspicious signs of intrusions. Their aim is to recognise already on-going attacks, and possibly block them, in co-operation with other tools like firewalls, as well. According to data processing, one family of IDS-s is anomaly based intrusion detection systems, which assu...

2006
Zhou Lianying

A Swarm-intelligence-based intrusion detection technique is proposed to in order to reduce the misjudgment & misdetection and increase the real-time response in the existing intrusion detection techniques show. Separating a huge and complicated intrusion detection system into severer independent detection units with unique function so that the amount of detection data processing and the complex...

2005
Lionel Litty

Hypervisor-based Intrusion Detection Lionel Litty Master of Science Graduate Department of Computer Science University of Toronto 2005 Unauthorized access by intruders to computer systems is a pervasive and seemingly worsening problem. This research explores the implementation of the Intrusion Sensing and Introspection System (ISIS). ISIS is an Intrusion Detection System (IDS) implemented in a ...

2004
RICHARD A. WASNIOWSKI

In this paper we propose a framework for intrusion detection called Fuzzy Agent-Based Intrusion Detection. A unique feature of our model is that the agents use the fuzzy logic to process log files. This reduces the overhead in a distributed intrusion detection system. We have developed an agent communication architecture that provides a prototype implementation. Key-Words: intrusion detection, ...

2007
Xia Wang Johnny S. Wong Tu-liang Lin Johnny Wong

As Mobile ad-hoc network (MANET) has become a very important technology the security problem, especially, intrusion detection technique research has attracted many people�s effort. MANET is more vulnerable than wired network and suffers intrusion like wired network. This paper investigated some intrusion detection techniques using machine learning and proposed a profile based neighbor monitorin...

2005
Richard A. Wasniowski

In this paper we propose a framework for multisensor intrusion detection called Fuzzy Agent-Based Intrusion Detection System. A unique feature of this model is that the agent uses data from multiple sensors and the fuzzy logic to process log files. Use of this feature reduces the overhead in a distributed intrusion detection system. We have developed an agent communication architecture that pro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید