نتایج جستجو برای: network intrusion detection

تعداد نتایج: 1198390  

Journal: :CoRR 2009
Mohammad Saiful Islam Mamun A. F. M. Sultanul Kabir Md. Sakhawat Hossen Razib Hayat Khan

In recent years, wireless sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system (IDS) needs to be introduced. In this paper we prop...

2003
Ioannis Charitakis Dionisios N. Pnevmatikatos Evangelos P. Markatos Kostas G. Anagnostakis

We present a software architecture that enables the use of the IXP1200 network processor in packet header analysis for network intrusion detection. The proposed work consists of a simple and efficient run-time infrastructure for managing network processor resources, along with the S2I compiler, a tool that generates efficient C code from highlevel, human readable, intrusion signatures. This app...

Journal: :Advances in Electrical and Electronic Engineering 2013

Journal: :International Journal of Computer Science and Engineering 2020

Journal: :journal of advances in computer research 2014
bahareh gholipour goodarzi hamid jazayeri soheil fateri

in recent years, the needs of the internet are felt in lives of all people.  accordingly, many studies have been done on security in virtual environment. old technics such as firewalls, authentication and encryption could not provide internet security completely; so, intrusion detection system is created as a new solution and a defense wall in cyber environment. many studies were performed on d...

1999
Anup K. Ghosh Aaron Schwartzbard

Intrusion detection and response has traditionally been performed at the network and host levels That is intrusion monitors will typically analyze network packet logs or host machine audit logs for signs of intrusion activity More often than not commercial o the shelf COTS intrusion detection tools use ngerprints of known intrusions to detect their presence in these audit trails Both these appr...

2012
Garima Shrivastava Anurag Jain

Intrusion Detection System plays a reasonable supplementary role for the firewall in the network security. It can help protect computers from network attacks and improve the security and reliability of the computer. At present intrusion detection system analysis module uses the pattern matching technology. In this article an optimized algorithm was proposed through analyzing the advantages and ...

2012
Sharmila Devi Ritu Nagpal

Today we are suffering from many problems because of intruder interference in our communication with other person/organisation. We need a very safe and secure intrusion detection system. So, intrusion detection has become an important area of research The existing systems are not completely flawless and secure. So, there is the need to improve the existing system. In this paper, firstly we are ...

2011
Purvag Patel Chet Langin Feng Yu Shahram Rahimi

Our research created a network Intrusion Detection Math (ID Math) consisting of two components: (1) a way of specifying intrusion detection types in a manner which is more suitable for an analytical environment; and (2) a computational model which describes methodology for preparing intrusion detection data stepwise from network packets to data structures in a way which is appropriate for sophi...

2013
Abdulbasit Ahmed Alexei Lisitsa

Network intrusion detection systems are faced with the challenge of keeping pace with the increasingly high volume network environments. Also, the increase in the number of attacks and their complexities increase the processing and the other resources required to run intrusion detection systems. In this paper, a novel intrusion detection system is developed (TeStID). TeStID combines the use of ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید