نتایج جستجو برای: intrusion related gold systems
تعداد نتایج: 2333285 فیلتر نتایج به سال:
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
Intrusion detection systems are most popular de-fence mechanisms used to provide security to IT infrastructures. Organisation need best performance, so it uses multiple IDSs from different vendors. Different vendors are using different formats and protocols. Difficulty imposed by this is the generation of several false alarms. Major part of this work concentrates on the collection of alerts fro...
Intrusion detection systems (IDS) provide valuable tools to monitor for, and militate against, the impact of cyber-attacks. However, this paper identifies a range of theoretical and practical concerns when these systems are integrated into safety-critical systems. White-list approaches enumerate the processes that can legitimately exploit system resources and any other access requests are inter...
A system that can continue critical operations, perhaps in a degraded mode, in the face of a partially successful cyber attack can be termed “intrusion tolerant.” The workshop will provide a forum for the presentation and discussion of current efforts to develop subsystems and systems that display some degree of intrusion tolerance. The workshop will also provide the opportunity for demonstrati...
One of the most important responsibilities of every company is to preserve the integrity, confidentiality, and availability of its data. Many efforts have been made to accomplish this goal: security policies, firewalls, intrusion detection systems, anti-virus software, and standards to configure services in operating systems and networks. This paper focuses on one of those topics: intrusion det...
high processing loads, need for complicated and frequent updating, and high false alarm are some of the challenges in designing anomaly detection and misuse detection systems. we propose a new network-based intrusion detection system (ids) that resolves such shortcomings. our scheme fuses anomaly detection and misuse detection systems, which has not been utilized so far in existing systems. in ...
Designers of intrusion detection systems are often faced with the problem that their design fails to meet the specification because the actual implementation is not able to detect attacks as required. This work aims at addressing such shortcomings at an early stage of the design process. The proposed method provides guidance to intrusion detection systems designers by predicting whether or not ...
Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...
The explosive growth of malicious activities on worldwide communication networks, such as the Internet, has highlighted the need for efficient intrusion detection systems. The efficiency of traditional intrusion detection systems is limited by their inability to effectively relay relevant information due to their lack of interactive/immersive technologies. In this paper, we explore several netw...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید