نتایج جستجو برای: intrusion detection system ids
تعداد نتایج: 2690345 فیلتر نتایج به سال:
Increase in the number of network based transactions for both personal and professional use has made network security gain a significant and indispensable status. The possible attacks that an Intrusion Detection System (IDS) has to tackle can be of an existing type or of an entirely new type. The challenge for researchers is to develop an intelligent IDS which can detect new attacks as efficien...
Over the past three or four years there has been some controversy regarding the applicability of intrusion detection systems (IDS) to the forensic evidence collection process. Two points of view, essentially, have emerged. One perspective views forensic evidence collection and preservation in the case of a computer or network security incident to be inappropriate for an intrusion detection syst...
The intrusion detection systems (IDSs) have attracted more researchers from last two decades. The much more work has been done in IDS. But still, there are some problems remain unsolved like false positive rate and detection accuracy. The various approaches are used in developing IDS; some of these are data mining, machine learning, statistic-based, and rule-based approaches. In this paper, we ...
the Intrusion Detection System (IDS) is tool which detects an unauthorised, misuse of computer system and provides information security. An intrusion detection system (IDS) is combined with hardware and software elements that work together to find unexpected events which may indicate an attack will happen, is happening, or has happened. Network intrusion detection based on anomaly detection pro...
Intrusion Detection System (IDS) is one of a crucial issue and a major research problem in network security. This work, An Adaptive multi-Layer Intrusion Detection System (ALIDS) is designed and developed to achieve high efficiency, scalability, flexibility and improve the detection and classification rate accuracy. We apply C5 decision tree on our model. Our experimental results showed that th...
Intrusion detection and secure routing schemes have been proposed for increasing the security and reliability in critical scenarios like mobile ad hoc networks. In this paper we present an integrated secure routing system based on Intrusion Detection Systems (IDS) and SUCV (Statistically Unique and Cryptographically Verifiable) identifiers. The proposed IDS has been used for the support of secu...
Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is increasing steadily. The idea of filtering the traffic at the “entrance door” (by firewalls, for instance) is not completely successful since it does not allow monitoring of local traffic. This paper presents a lightweig...
BcN(Broadband convergence Networks) is being deployed in order to support a variety of network applications such as ECommerce, DMB(Digital Multimedia Broadcasting), Home Network, VoIP(Voice over IP), and other services. As network bandwidth is growing rapidly and services are converged, the opportunity and severity of network intrusions are growing as well. This paper presents a novel Intrusion...
This paper presents a brief review of the application of various Data Mining techniques and their advances in the design, development and application of Intrusion Detection Systems (IDS) for protecting computer and communication networks from intruders. Data mining techniques are used to monitor and analyze large amount of network data & classify these network data into anomalous and normal dat...
IntroductIon Wireless ad hoc networks have attracted extensive attention among researchers in recent years. As the research activities matured, it has been widely realized that security in such networks is a major issue, and an extremely challenging one. The challenge arises mainly from the inherent AbstrAct Intrusion detection in ad hoc networks is a challenge because of the inherent character...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید