نتایج جستجو برای: intrusion detection systems idss

تعداد نتایج: 1697787  

Journal: :IJCNIS 2009
Aline Lopes da Silva Zair Abdelouahab Denivaldo Lopes

Recently, mobile devices and wireless networks are more common for supporting human activities providing mobility and flexibility. Mobile devices inside a wireless environment contribute to make easily accessible and available the information. However, wireless environment is susceptible to vulnerabilities due to information which is propagated through the air and thus exposed to interception o...

2013
Kiran Dhangar Deepak Kulhare Arif Khan

This paper titled “Proposed Intrusion Detection System” is an intrusion detection system (IDS) proposed by analyzing the principle of the intrusion detection system based on host and network. Here we are concentrating and analyzing overall performance as well as security of the proposed IDS. Moreover the proposed IDS approve the effectiveness of the proposed method, and presented results shows ...

Journal: :INFORMS Journal on Computing 2008
Hulisi Ogut Huseyin Cavusoglu Srinivasan Raghunathan

I systems (IDSs) form an important component of IT security architectures, but the low proportion of hackers in the user population severely limits the usefulness of IDSs. Thus, even when the IDS is good, an intrusion signal may not imply that the user is more likely to be a hacker than a normal user. Ignoring the low base rate for the proportion of hackers results in acting on every intrusion ...

Journal: :journal of computer and robotics 0
maryam fathi ahmadsaraei faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran abolfazl toroghi haghighat faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

by extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. security is a serious challenge for actual implementation in wireless networks. due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...

2004

This paper presents techniques to integrate and reason about complementary intrusion evidence such as intrusion alerts generated by intrusion detection systems (IDSs) and reports by system monitoring or vulnerability scanning tools. To facilitate the modeling of intrusion evidence, this paper classifies intrusion evidence into either event-based evidence or state-based evidence. Event-based evi...

Journal: :IEEE Internet of Things Journal 2021

Edge of Things (EoT) enables the seamless transfer services, storage, and data processing from cloud layer to edge devices in a large-scale distributed Internet (IoT) ecosystems (e.g., Industrial systems). This transition raises privacy security concerns EoT paradigm at different layers. Intrusion detection systems (IDSs) are implemented protect underlying resources attackers. However, current ...

2007
U Aickelin J Twycross

Intrusion Detection Systems (IDSs) provide an important layer of security for computer systems and networks. An IDS’s responsibility is to detect suspicious or unacceptable system and network activity and to alert a systems administrator to this activity. The majority of IDSs use a set of signatures that define what suspicious traffic is, and SNORT is one popular and actively developing open-so...

Journal: :CoRR 2014
Tanusree Chatterjee Abhishek Bhattacharya

The rapid development and expansion of World Wide Web and network systems have changed the computing world in the last decade and also equipped the intruders and hackers with new facilities for their destructive purposes. The cost of temporary or permanent damages caused by unauthorized access of the intruders to computer systems has urged different organizations to increasingly implement vario...

2007

The dependability of an Intrusion Detection System (IDS) relies on two factors: ability to detect intrusions and survivability in hostile environments. Machine learningbased anomaly detection approaches are gaining increasing attention in the network intrusion detection community because of their intrinsic ability to discover novel attacks. This ability has become critical since the number of n...

2007
Theodoros Lappas Konstantinos Pelechrinis

In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion detection does not, in general, include prevention of intrusions. In this paper, we are mostly focused on data mining techniques that are being used for such purposes. We debate on the advantages and disadvantages of thes...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید