نتایج جستجو برای: web intrusion detection system

تعداد نتایج: 2839330  

Journal: :Computer Networks 2008
Bin Liu Chuang Lin Jian Qiao Jianping He Peter D. Ungsunan

In this paper, a flow analysis and monitoring system based on NetFlow is introduced. The system is built on a Browser– Server framework, aimed at enterprise networks. Data collection and display are separated into two modules, which makes the system clearly demarcated and easy to deploy. The data collection module receives and analyzes NetFlow-exported packets and inserts per flow record inform...

Journal: :CoRR 2014
Tanusree Chatterjee Abhishek Bhattacharya

The rapid development and expansion of World Wide Web and network systems have changed the computing world in the last decade and also equipped the intruders and hackers with new facilities for their destructive purposes. The cost of temporary or permanent damages caused by unauthorized access of the intruders to computer systems has urged different organizations to increasingly implement vario...

2003
Yu-Sung Wu Bingrui Foo Blake Matheny Tyler Olsen Saurabh Bagchi

Distributed e-commerce systems are suitable targets for malicious attacks because of the potential financial impact. Intrusion detection in such systems has been an active area of research. Once an intrusion is detected, it is important to contain the effect of the intrusion to some parts of the system while allowing the other parts to continue to provide service. It is also important to take p...

2015

Intrusion behavior has the characteristics of fast upgrade, strong concealment In this paper, an integrated network intrusion detection algorithm by combining. judge the safety of a system or network. (6). Intrusion Detection Systems (IDS) are primarily centered on characteristic probable incidents, observation data. ABSTRACT: Intrusion Detection Systems are designed to detect system attacks Re...

Journal: :CoRR 2016
Gunupudi Rajesh Kumar Nimmala Mangathayaru Gugulothu Narsimha

Intrusion Detection is one of major threats for organization. The approach of intrusion detection using text processing has been one of research interests which is gaining significant importance from researchers. In text mining based approach for intrusion detection, system calls serve as source for mining and predicting possibility of intrusion or attack. When an application runs, there might ...

2003
Yu-Sung Wu Bingrui Foo Blake Matheny Tyler Olsen Saurabh Bagchi

Distributed e-commerce systems are suitable targets for malicious attacks because of the potential financial impact. Intrusion detection in such systems has been an active area of research. Once an intrusion is detected, it is important to contain the effect of the intrusion to some parts of the system while allowing the other parts to continue to provide service. It is also important to take p...

2014
Jamuna Bhandari Cliff Stoll

String matching also known as pattern matching is one of primary concept for network security. In this area the effectiveness and efficiency of string matching algorithms is important for applications in network security such as network intrusion detection, virus detection, signature matching and web content filtering system. This paper presents brief review on some of string matching technique...

2014
Manoj Sharma Keshav Jindal

The numbers of networking attacks are increased from last few years; so there is a need of software and hardware tools to control unauthorized access of a network (intrusion detection) .Firewalls do not provide full protection assurance, so they are complemented by an intrusion detection system. The role of intrusion detection is to enable the computer system to deal with networking attacks . M...

2000
STEFAN AXELSSON Hans Hedbom Stefan Lindskog Stefan Axelsson

With the ever increased use of computers for critical systems, computer security— the protection of data and computer systems from intentional, malicious intervention—is attracting increasing attention. Many methods of defence already exist, of which one is the strong perimeter defence. This thesis is concerned with one such method of defence, the automated computer security intrusion detection...

Predicting different behaviors in computer networks is the subject of many data mining researches. Providing a balanced Intrusion Detection System (IDS) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. Many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید