نتایج جستجو برای: intrusion response system

تعداد نتایج: 3050974  

Journal: :International Journal of Computer Applications 2016

Journal: :Journal of King Saud University - Computer and Information Sciences 2012

Journal: :International Journal of Computer Applications 2015

Journal: :International Journal for Research in Applied Science and Engineering Technology 2017

Journal: :International Journal of Security, Privacy and Trust Management 2015

2002
Thomas Toth Christopher Krügel

Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators neither can keep up with the pace that an IDS is delivering alerts, nor can they react upon these within adequate time limits. Automatic response systems have to take over that task. In case of an identified intrusion, t...

2013
Garima Shrivastava Anurag Jain

In network security, Intrusion Detection System plays a reasonable supplementary role for the firewall. It improves the security and reliability of the computer and helps protect computers from network attacks. At present intrusion detection system analysis module uses the pattern matching technology. In this article, through analyzing the advantages and disadvantages of the main pattern matchi...

2008
Liberios VOKOROKOS Anton BALÁŽ Norbert ÁDÁM

The goal of this paper is to present designed architecture of intrusion detection system based on events planning and intrusion signature. The article describes problematic of the variation of intrusions and intrusion detection systems. The core of the proposed architecture is intrusion signature matching through petri nets that clasify system behaviour and determine potential intrusion of moni...

Journal: :Computer and Information Science 2009
Huawang Qin Yuewei Dai Zhiquan Wang

Intrusion tolerance is the rising third generation technology of network security. For the shortcomings of existing models, a model of intrusion tolerant system based on game theory is proposed. The intrusion tolerant system and the intruder are seen as the two sides of the game. The income functions of the two sides are designed basing on some given concepts. Through quantifying and analyzing ...

2001
Xinyuan Wang Douglas S. Reeves Shyhtsun Felix Wu Jim Yuill

Network-based intrusion has become a serious threat to today’s highly networked information systems, yet the overwhelming majority of current network security mechanisms are “passive” in response to network-based attacks. In particular, tracing and detection of the source of network-based intrusion has been left largely untouched in existing intrusion detection mechanisms. The fact that intrude...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید