نتایج جستجو برای: intrusion

تعداد نتایج: 18427  

2004
RICHARD A. WASNIOWSKI

In this paper we propose a framework for intrusion detection called Fuzzy Agent-Based Intrusion Detection. A unique feature of our model is that the agents use the fuzzy logic to process log files. This reduces the overhead in a distributed intrusion detection system. We have developed an agent communication architecture that provides a prototype implementation. Key-Words: intrusion detection, ...

2010
Ruchi Bhatnagar

The Intrusion Detection System (IDS) has become a critical component of wireless sensor networks security strategy. In this paper we have made an effort to document related issues and challenges of intrusion detection system for wireless sensor network and proposed a novel secure strategy for their implementation that can detect possible intrusion in the network, alerting user after intrusion h...

جمشیدی بدر, محبوبه , خادمی پارسا, مهناز ,

Sarvian intrusion is located in northeast of Delijan in the Orumieh-Dokhtar magmatic belt. Sarvian pluton consists of acidic and intermediate units and is composed of granite, granodiorite, tonalite and quartz-diorite. Main minerals of the intrusion are plagioclase, amphibole, biotite, quartz and K-feldspar. In this research, based on the EPMA analyses, thermobarometry of the rocks investigated...

Journal: :Computer Networks 2007
Marcos Laureano Carlos Maziero Edgard Jamhour

Intrusion detection systems continuously watch the activity on a network or computer, looking for attack and intrusion evidences. However, host-based intrusion detectors are particularly vulnerable, as they can be disabled or tampered by successful intruders. This work proposes and implements an architecture model aimed to protect host-based intrusion detectors, through the application of the v...

2009
Riaz Ahmed Shaikh Hassan Jameel Brian J. d'Auriol Heejo Lee Sungyoung Lee Young Jae Song

Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a cri...

Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...

Alireza Docheshmeh Gorgij Asghar Asghari Moghaddam

Overutilization of groundwater resources can put their quality under stress. It could be base on rapid declination in groundwater level leading to salt water intrusion in the coastal aquifers. The objective of this study was to map the vulnerability of salt water intrusion of the Urmia Lake, Iran to nearby coastal aquifer (Azarshahr) using GALDIT method. The GALDIT index based on six parameters...

In this study, abstraction, desalination and recharge method and SEAWAT numerical model are used to investigate seawater intrusion repulsion in a hypothetical two-dimensional coastal aquifer to understand the relation of seawater intrusion with abstraction, desalination and recharge parameters (i.e. abstraction/recharge rate, wells distance and depth). Abstraction, desalination and recharge con...

2015
Muhammet Baykara

Information security in the sense of personal and institutional has become a top priority in digitalized modern world in parallel to the new technological developments. Many methods, tools and technologies are used to provide the information security of IT systems. These are considered, encryption, authentication, firewall, and intrusion detection and prevention systems. Moreover, honeypot syst...

2013
Nilotpal Chakraborty

Intrusions in computing environment are a very common undesired malicious activity that is going on since the inception of computing resources. A number of security measures have taken place for the last three decades, but as Technology has grown up, so as the security threats. With the whole world depending on computers, being directly or indirectly, it is a very important issue to prevent the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید