نتایج جستجو برای: intrusion detection systems idss

تعداد نتایج: 1697787  

2009
Jaeun Choi Myungjong Lee Gisung Kim Sehun Kim

Since wireless resources are limited, an efficient way of utilizing wireless resources is needed in selecting IDSs. We propose a monitoring node selection scheme for intrusion detection in congested wireless sensor network. Network congestion is an important issue in mobile network. The network congestion does not guarantee a proper detection rate and congested networks should cause an unreliab...

1999
Peter Mell Mark McLarnon

Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical structure. An attacker can disable such a system by taking out a node high in the hierarchy, thus amputating a portion of the distributed system. One solution to this problem is to cast the internal nodes in the system hie...

2003
Zhang Jian Ding Yong Gong Jian

Current IDSs usually have several shortcomings. First, the speed and sensitivity of detection are not so ideal. Secondly, the response system lacks the ability to correct errors. Thirdly, the cost of intrusion detection is not considered, that is, the response policy is static. This paper applies fuzzy default theory to transform reasoning and response engine of IDS, based on the proving of IDS...

2003
Ja-Min Koo Sung-Bae Cho

Due to the proliferation of the infrastructure of communication networks and the development of the relevant technology, intrusions on computer systems and damage are increased, resulting in extensive work on intrusion detection systems (IDS) to find attacks exploiting illegal usages or misuses. However, many IDSs have some weaknesses, and most hackers try to intrude systems through the vulnera...

Journal: :Int. Arab J. e-Technol. 2011
Qutaiba Ibrahim Sahar Lazim

Intrusion Detection Systems (IDSs) have become widely recognized as powerful tools for identifying, deterring and deflecting malicious attacks over the network. Essential to almost every intrusion detection system is the ability to search through packets and identify content that matches known attacks. In this paper, common searching algorithms (string matching, Native, Boyer Moore and pattern ...

2017
Ishu Gupta Kishu Gupta

IJSER © 2016 http://www.ijser.org Review on Intrusion Detection System Architectures in WSN Ishu Gupta Research Scholar, Department of Computer Applications, National Institute of Technology, Kurukshetra136119, Haryana Email: [email protected] Kishu Gupta Research Scholar, Department of Computer Science & Applications, Kurukshetra University, kurukshetra136119, Haryana Email: kishugupta2@gm...

2014
R.Divya N.Saravanan

ABSTRACT: Mobile ad-hoc network is an infrastructure less network. Continuous user authentication is an important prevention-based approach to protect the high security mobile ad-hoc networks (MANETs). Also intrusion detection systems (IDS) are also important in MANET to effectively identify malicious activities. Most previous work studies these two classes of issues separately. In this paper, ...

Journal: :IEICE Transactions 2017
Bayu Adhi Tama Kyung Hyune Rhee

Anomaly detection is one approach in intrusion detection systems (IDSs) which aims at capturing any deviation from the profiles of normal network activities. However, it suffers from high false alarm rate since it has impediment to distinguish the boundaries between normal and attack profiles. In this paper, we propose an effective anomaly detection approach by hybridizing three techniques, i.e...

2007
Lin Chen Jean Leneutre

Due to the dynamic, distributed and heterogenous nature of today’s networks, intrusion detection systems (IDSs) have become a necessary addition to the security infrastructure and are widely deployed as a complementary line of defense to the classical security approaches. In this paper, we address the intrusion detection problem in heterogenous networks consisting of nodes with different securi...

Journal: :IJESDF 2007
Uwe Aickelin Jamie Twycross Thomas Hesketh-Roberts

Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and SNORT is one popular and actively developing open-so...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید