نتایج جستجو برای: ids

تعداد نتایج: 5339  

Journal: :CoRR 2017
David Wolpert

There are (at least) four ways that an agent can acquire information concerning the state of the universe: via observation, control, prediction, or via retrodiction, i.e., memory. Each of these four ways of acquiring information seems to rely on a different kind of physical device (resp., an observation device, a control device, etc.). However it turns out that certain mathematical structure is...

2012
Raúl Sánchez Álvaro Herrero Emilio Corchado

MOVICAB-IDS has been previously proposed as a hybrid intelligent Intrusion Detection System (IDS). This on-going research aims to be one step towards adding automatic response to this visualization-based IDS by means of clustering techniques. As a sample case of study for the proposed clustering extension, it has been applied to the identification of different network scans. The aim is checking...

2012
H. N. Pratihari

Flooding-based route discovery is usually preferred in MANETs in order to set up the route with reliability between transmission pair. However, this approach may cause a serious contention in information transfer between adjacent nodes and a considerable amount of control packets. The transfer of information between nodes is made secured by Intrusion detection system (IDS). The architecture of ...

2013
Raphaël Jamet Pascal Lafourcade

To secure Wireless Ad-hoc Networks (WANET) against malicious behaviors, three components are needed: prevention, detection, and response. In this paper, we focus on Intrusion Detection Systems (IDS) for WANET. We classify the different inputs used by the decision process of these IDS, according to their level of cooperation, and the source of their data. We then propose a decision aid which all...

Journal: :IJCSA 2005
Agustín Orfila Javier Ignacio Carbó Rubiera Arturo Ribagorda

Recent studies about Intrusion Detection Systems (IDS) performance reveal that the value of an IDS and its optimal operation point depend not only on the Hit and False alarm rates but also on costs (such as those associated with making incorrect decisions about detection) and the hostility of the operating environment. An adaptive multiagent IDS is proposed in this paper and it is evaluated acc...

2006
Kuo Zhao Liang Hu Guannan Gong Meng Zhang Kexin Yang

Data collection mechanism is a crucial factor for the performance of intrusion detection system (IDS). Simple random sampling and Stratified random sampling techniques of statistics are introduced to the procedure of data collection for IDS, and formulas used to calculate the sample size of packets based on these sampling techniques are presented. The implementation of packets sampling is provi...

2017
Okko Johannes Räsänen Sofoklis Kakouros Melanie Soderstrom

The exaggerated intonation and special rhythmic properties of infant-directed speech (IDS) have been hypothesized to attract infant’s attention to the speech stream. However, studies investigating IDS in the context of models of attention are few. A number of such models suggest that surprising or novel perceptual inputs attract attention, where novelty can be operationalized as the statistical...

2012
Kanubhai K. Patel Bharat V. Buddhadev

Received Nov 4 th , 2012 Revised Dec 19 th , 2012 Accepted Dec 22 th , 2012 Intrusion Detection System (IDS) is renowned and widely-deployed security tool to detect attacks and malicious activities in information system. It is an essential element of any contemporary information system. There are mainly two techniques for intrusion detection: i) misuse (signature-based) detection and ii) anomal...

Journal: :Neurocomputing 2009
Álvaro Herrero Emilio Corchado María A. Pellicer Ajith Abraham

A novel hybrid artificial intelligent system for Intrusion Detection, called MOVIH-IDS, is presented in this study. A hybrid model built by means of a multiagent system that incorporates an unsupervised connectionist Intrusion Detection System (IDS) has been defined to guaranty an efficient computer network security architecture. This hybrid IDS facilitates the intrusion detection in dynamic ne...

2001
Y. Xiang

In uence diagrams (IDs) provide a concise graphical formulation for decision making in intelligent agents. In this work, we propose a simple method to evaluate IDs by rst converting IDs into BNs and then applying a junction tree-based inference algorithm. The methods are more e cient than methods in [1, 5] and are simpler than [6]. (

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید