نتایج جستجو برای: intrusion detection systems ids
تعداد نتایج: 1700198 فیلتر نتایج به سال:
The Mobile Agent Intrusion Detection System (MAIDS) is an agent based distributed Intrusion Detection System (IDS). A disciplined requirement engineering process is developed to build MAIDS. The starting point is a high level description of intrusions expressed as Software Fault Trees (SFTs). Then the SFTs are translated to Colored Petri Nets (CPNs) that specify the IDS design. Subsequently, th...
Intrusion detection is the act of detecting unwanted traffic on a network or a device. A intrusion detection system (IDS) provides a layer of defense which monitors network traffic for predefined suspicious activity or patterns, and alert system administrators when potential hostile traffic is detected. Intrusion detection faces a number of challenges; an intrusion detection system must reliabl...
Wireless Sensor Networks (WSNs) have been employed in many real-world applications that greatly improve our life. by applying a genetic operator. However, the Intrusion detection systems in wireless sensor networks: A review. Intrusion Detection System (IDS) provides a solution to this problem by analysing the network in order to detect abnormal behaviour of the sensor node(s). A well designed ...
Résumé. Intrusion detection is an important topic dealing with security of information systems. Most successful Intrusion Detection Systems (IDS) rely on signature detection and need to update their signature as fast as new attacks are emerging. On the other hand, anomaly detection may be utilized for this purpose, but it suffers from a high number of false alarms. Actually, any behaviour which...
Intrusion Detection Systems (IDS) are software or hardware systems, which automatically monitor network traffic looking for suspicious signs of intrusions. Their aim is to recognise already on-going attacks, and possibly block them, in co-operation with other tools like firewalls, as well. According to data processing, one family of IDS-s is anomaly based intrusion detection systems, which assu...
This paper titled “Proposed Intrusion Detection System” is an intrusion detection system (IDS) proposed by analyzing the principle of the intrusion detection system based on host and network. Here we are concentrating and analyzing overall performance as well as security of the proposed IDS. Moreover the proposed IDS approve the effectiveness of the proposed method, and presented results shows ...
The intrusion detection systems (IDSs) have attracted more researchers from last two decades. The much more work has been done in IDS. But still, there are some problems remain unsolved like false positive rate and detection accuracy. The various approaches are used in developing IDS; some of these are data mining, machine learning, statistic-based, and rule-based approaches. In this paper, we ...
Machine learning systems are deployed in many adversarial conditions like intrusion detection, where a classifier has to decide whether a sequence of actions come from a legitimate user or not. However, the attacker, being an adversarial agent, could reverse engineer the classifier and successfully masquerade as a legitimate user. In this paper, we propose the notion of a Proactive Intrusion De...
One key feature of intrusion detection systems is their ability to provide a view of unusual activity and issue alerts notifying administrators and/or block a suspected connection. Intrusion detection is a process of identifying and responding to malicious activity targeted at computing and networking resources. Over the past decade, the field of IDS has been driven into overdrive by the explos...
In traditional intrusion detection system (IDS) environments, little activity has been applied to using visual analysis as an aid to intrusion detection. With more information systems being attacked and attack techniques evolving, the task of detecting intrusions is becoming an increasingly difficult. Efficient information visualization is an important element required for urgent detection of i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید