نتایج جستجو برای: intrusion detection system

تعداد نتایج: 2688299  

2009

1. Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies, acceptable use policies, or standard security practices. Intrusion prevention is the process of performing intrusion detection and attempting to stop detec...

Journal: :I. J. Network Security 2016
Mehdi Hosseinzadeh Aghdam Peyman Kabiri

Intrusion detection is a major research problem in network security. Due to the nonlinear nature of the intrusion attempts, unpredictable behavior of the network traffic and the large number of features in the problem space, intrusion detection systems represent a complicated problem area. Choosing effective and key features for intrusion detection is a very important topic in information secur...

2014
Liang Lei

As computer networks and distributed applications more complex, diverse and intelligent, network behavior anomaly detection has gradually become the effective monitoring and system controlling technology. The paper established a network intrusion detection system and to investigate the data rules, sensors and abnormal behavior automatic identification in this system, a kind of algorithm based o...

2008
Jaydip Sen

Because all vulnerabilities of a network cannot be predicted beforehand, and penetration of the system cannot always be prevented, intrusion detection systems have become necessary to ensure the security of a network. The intrusion detection systems need to be accurate, adaptive, and extensible. Given these requirements and the complexities of today’s network environments, the design of an intr...

2012
Vijaya Lakshmi

Intrusion detection involves a lot of tools that are used to identify different types of attacks against computer systems and networks. With the development of network technologies and applications network attacks are greatly increasing both in number and severe. Open source and commercial network intrusion detection tools are not able to predict new type of attacks based on the previous attack...

2005
Paul F. Evangelista

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii

1998
Leslie Franklin Keith Marzullo Chanathip Namprempre Jeremy Sussman Ramanathan Krishnamurthy Meng-Jang Lin Aleta Ricciardi

2013
Anitha

In spite of growing information system widely, security has remained one hard-hitting area for computers as well as networks. In information protection, Intrusion Detection System (IDS) is used to safeguard the data confidentiality, integrity and system availability from various types of attacks. Data mining is an efficient artifice that can be applied to intrusion detection to ascertain a new ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید