نتایج جستجو برای: intrusion detection systems ids
تعداد نتایج: 1700198 فیلتر نتایج به سال:
Operating system intrusion detection systems (OS IDS) are frequently insufficient to catch internal intruders who neither significantly deviate from expected behavior nor perform a sequence of specific intrusive actions. We hypothesize that application intrusion detection systems (AppIDS) can use application semantics to detect more subtle attacks such as those carried out by internal intruders...
Data mining techniques have been successfully applied in many fields including marketing, manufacturing, process control, fraud detection and network management. In recent years, data mining-based Intrusion Detection Systems (IDS) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behavior in a changing environment. In data mining based intrusion detect...
Intrusions are the activities that violate the security policy of system. Intrusion Detection is the process used to identify intrusions. Network security is to be considered as a major issue in recent years, since the computer network keeps on extending dramatically. Information Systems and Networks are subject to electronic attacks and the possibilities of intrusion are very high. An Intrusio...
Network intrusions have become a significant threat in recent years as a result of the increased demand of computer networks for critical systems. Intrusion detection system (IDS) has been widely deployed as a defense measure for computer networks. Features extracted from network traffic can be used as sign to detect anomalies. However with the huge amount of network traffic, collected data con...
Intrusion detection systems (IDS) are considered nowadays as one of the most important components in the security architecture of information systems. For a Misuse-based IDS, also known as signature based IDS, the efficiency of detection is highly correlated to the quality of signatures. It is therefore very important to select a suitable formal language that provides both high expressiveness a...
This paper presents an analysis of a rules-based approach and a statistical anomaly approach to Intrusion Detection Systems (IDS). Two IDS systems are implemented. Analysis and comparisons of the systems are presented, as well as conclusions regarding the two approaches.
The domain of wireless networks is inherently vulnerable to attacks due to the unreliable wireless medium. Such networks can be secured from intrusions using either prevention or detection schemes. This paper focuses its study on intrusion detection rather than prevention of attacks. As attackers keep on improvising too, an active prevention method alone cannot provide total security to the sys...
Network security has become an essential component of any computer network. Despite significant advances having been made on network-based intrusion prevention and detection, ongoing attacks penetrating network-based security mechanisms have been reported. It is being realized that network-based security mechanisms such as firewalls or intrusion detection systems (IDS) are not effective in dete...
Tremendous efforts have been taken over many years to secure the network against attacks; still attackers are successful with painful frequency. Experienced attackers try to disable the Intrusion Detection System (IDS) before launching attack. Therefore there should be some mechanism in IDS for uninterrupted detection of intrusion even though failure in IDS has occurred due to attacks. This pap...
the Intrusion Detection Systems (IDS) are now an essential component in the structure of network security. The logs of connections and network activity, with a large amount of information, can be used to detect intrusions. Despite the development of new technologies of information and communication following the advent of the Internet and networks, computer security has become a major challenge...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید