نتایج جستجو برای: intrusion related gold systems

تعداد نتایج: 2333285  

2016
Azidine GUEZZAZ Ahmed ASIMI Yassine SADQI Younes ASIMI

Nowadays, the protection and the security of data transited within computer networks represent a real challenge for developers of computer applications and network administrators. The Intrusion Detection System and Intrusion Prevention System are the reliable techniques for a Good security. Any detected intrusion is based on data collection. So, the collection of an important and significant tr...

Journal: :Aerospace 2022

Drone expansion needs to be considered as a menace in cases of negligent, illicit, or non-cooperative use. In the case airports, complete protection against drone intrusion should rely on an management system, aiming at avoiding closure airport. This system requires setting proper risk assessment methodologies for airport operations, explicitly consider features intrusion, possibly from quantit...

Journal: :Journal of Computer Security 2002
Florian Kerschbaum Eugene H. Spafford Diego Zamboni

We introduce the concept of using internal sensors to perform intrusion detection in computer systems. We show its practical feasibility and discuss its characteristics and related design and implementation issues. We introduce a classification of data collection mechanisms for intrusion detection systems. At a conceptual level, these mechanisms are classified as direct and indirect monitoring....

2008
Alireza Osareh Bita Shadgar

Network security technology has become crucial in protecting government and industry computing infrastructure. Modern intrusion detection applications face complex requirements; they need to be reliable, extensible, easy to manage, and have low maintenance cost. In recent years, machine learning-based intrusion detection systems have demonstrated high accuracy, good generalization to novel type...

Journal: :Computer and Information Science 2010
Olusegun Folorunso Oluwatobi O. Akande Adewale Opeoluwa Ogunde Olufunke R. Vincent

The study examined the detection of attacks against computer networks, which is becoming a harder problem to solve in the field of Network security. A problem with current intrusion detection systems is that they have many false positive and false negative events. Most of the existing Intrusion detection systems implemented depend on rule-based expert systems where new attacks are not detectabl...

Karimpour, , Almasi, , Mazaheri, , Miri Beydokhti, ,

The Balazard prospecting area is located about 120 km southwest of Nehbandan city, Khorasan Jonoobi Province, in the central parts of Lut block volcano-plutonic belt.  The intrusion of a granitoid pluton into rhyolitic and andesitic rocks has led to alteration and mineralization. Hydrothermal alteration zones consist of argillic, sericite-argillic, silicic-argillic, propylitic, and advanced arg...

2013
Murtaza Hussain Shaikh

Computer systems of today are subject to many attacks and it can be anticipated that these problems will increase in the future era. One way of protecting the systems is to use better authentication and other categories of preventive security mechanisms. These mechanisms do not offer good enough protection in most cases and they should therefore be complemented with monitoring and detection mec...

Journal: :Computer Networks 1999
Hervé Debar Marc Dacier Andreas Wespi

Intrusion detection systems aim at detecting attacks against computer systems and networks or against information systems in general as it is di cult to provide provably secure information systems and maintain them in such a secure state for their entire lifetime and for every utilization Sometimes legacy or operational con straints do not even allow a fully secure information system to be real...

2006
Jinqiao Yu Y. V. Ramana Reddy Sumitra Reddy

Due to many inherent deficiencies and flaws, current intrusion detection systems (IDS) are plagued by numerous problems. Intrusion Detection Systems are often inefficient and ineffective when used alone. IDS products need to be fully integrated into the security defense line. Intrusion alert analysis and management are crucial in achieving this. In this paper, we describe an intrusion detection...

2015

In network security Intrusion detection systems (IDS) are an important element in a network's Typically, Intrusion detection systems are two types.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید