نتایج جستجو برای: intrusion response system

تعداد نتایج: 3050974  

Journal: :International journal of Computer Networks & Communications 2014

2008
Maheyzah Md. Siraj Siti Zaiton Mohd. Hashim

In response to proliferated attacks on enterprise systems today, practitioners employ multiple, diverse intrusion detection sensors to improve the detection rate and the coverage within the system for increased information assurance. An important problem in such environment is the management of alerts. One of the essential issues in alerts management is the standardization of the alerts format....

2002
Alfonso Valdes Magnus Almgren Steven Cheung Yves Deswarte Bruno Dutertre Joshua Levy Hassen Saïdi Victoria Stavridou Tomás E. Uribe

We describe a general architecture for intrusion-tolerant enterprise systems and the implementation of an intrusion-tolerant Web server as a specific instance. The architecture comprises functionally redundant COTS servers running on diverse operating systems and platforms, hardened intrusion-tolerance proxies that mediate client requests and verify the behavior of servers and other proxies, an...

Journal: :J. Parallel Distrib. Comput. 2002
Azzedine Boukerche Mirela Sechi Moretti Annoni Notare

In this work, we discriminate the malicious behavior of users from the normal A Cloud-based Intrusion Detection and Response System for Mobile Phones. and operating systems, especially focusing on IDS-based models and tools. With this each approach.

Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...

2015
John Felix Charles Joseph Amitabha Das

IntroductIon Wireless ad hoc networks have attracted extensive attention among researchers in recent years. As the research activities matured, it has been widely realized that security in such networks is a major issue, and an extremely challenging one. The challenge arises mainly from the inherent AbstrAct Intrusion detection in ad hoc networks is a challenge because of the inherent character...

1999
Jeff Rowe

With current intrusion detection technology, it is possible to detect attacks in real time. Typically, when an IDS system is triggered, a human operator is notified. The system is then adjusted manually in response to the intrusion. Many types of attacks, however, can only be thwarted if the response is quick. Responding quickly, without considering the self-inflicted damage that a response mig...

2016
Sree Kala A. Christy

Nowadays the organizations are facing the number of threats every day in the form of viruses and attack etc. Since many different mechanisms were preferred by organizations in the form of intrusion detection and prevention system to protect its organizations from these kinds of attacks. Intrusion Detection System (IDS) is considered as a system integrated with intelligent subsystems. In this pa...

Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...

2014
Sivaprakash

The intrusion detection system identifies the legitimate and attackers in the network area. The intrusion detection system is designed in two categories. In the first model a system component is used for monitoring the security of a WSN and diagnosing compromised or vulnerable. Second model is the monitoring or surveillance system for detecting a malicious intruder that invades the network doma...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید