نتایج جستجو برای: intrusion detection systems ids
تعداد نتایج: 1700198 فیلتر نتایج به سال:
The percentage of encrypted network traffic increases steadily not only by virtual private networks of companies but also by protocols like SSH or SSL in the private sector. Traditional Intrusion Detection Systems (IDS) are not able to cope with encrypted traffic. There are a few systems which are able to handle encrypted lines but none of them is applicable in general because of the necessity ...
In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion detection systems which are only loosely coupled to the components which they protect. We argue that a tighter coupling makes an IDS less vulnerable to desynchronization attacks, furnishes it with higher quality information and make...
Self-protected Mobile Agent Approach for Distributed Intrusion Detection System against DDoS Attacks
With the growing Information Systems and Network technologies, security threats over the systems have also become common. Providing a security mechanism to detect such threats has become an inevitable part of Information Systems. Distributed Denial of Service (DDoS) attack is one of the most common attacks which are done in a co-ordinated manner. Hence, we need a Distributed Intrusion Detection...
Anomaly based intrusion detection is a critical research area, since it does not require any prior knowledge of attack signatures in order to detect them. Typically, intrusion detection systems (IDSs) consider a fix learning model, and generally do not contemplate any memory constraint. These assumptions may not be valid in real world scenarios, where the learning model may evolve and the avail...
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
When system administrators monitor the security of computer network(s) they often use an intrusion detection system (IDS). The IDS examines events (in network traffic, operating systems, etc.) and raises an alarm if the events are believed to be symptoms of an intrusion. A number of studies investigate IDSs from a technical perspective. These studies typically investigate the technical quality ...
Intrusion Detection Systems (IDS) aim at detecting and possibly preventing the execution of attacks against computer networks, thus representing a fundamental component of a network defence-indepth architecture. Designing an IDS can be viewed as a pattern recognition problem. Pattern recognition techniques have been proven successful in learning concepts from example data and constructing class...
Due to increasing incidents of cyber attacks, building effective Intrusion Detection Systems (IDS) are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. Current IDS examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or low importance during detection process. The purpose of this s...
Intrusion Detection System is significant in network security. It detects and identifies intrusion behavior or intrusion attempts in a computer system by monitoring and analyzing the network packets in real time. In the recent year, intelligent algorithms applied in the intrusion detection system (IDS) have been an increasing concern with the rapid growth of the network security. IDS data deals...
Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in high security mobile ad hoc networks (MANETs). This paper studies distributed combined authentication and intrusion detection with data fusion in such MANETs. Multimodal biometrics are deployed to work with Intrusion Detection Systems (IDS) to alleviate the shortcomings of unimodal biome...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید