نتایج جستجو برای: network intrusion detection

تعداد نتایج: 1198390  

2011
R. J. Jadhav U. T. Pawar

Increasing network intrusion becoming crucial problem in security infrastructures. Data mining techniques have been successfully applied in many different fields including insolvency prediction, churn prediction, marketing, process control, fraud detection, and network management. Today number of research projects is using data mining for intrusion detection system (IDS) and prevention. The goa...

Journal: :Journal of Systems and Software 2007
Lih-Chyau Wuu Chi-Hsiang Hung Sout-Fong Chen

In this paper, we enhance the functionalities of Snort network-based intrusion detection system to automatically generate patterns of misuse from attack data, and the ability of detecting sequential intrusion behaviors. To that, we implement an intrusion pattern discovery module which applies data mining technique to extract single intrusion patterns and sequential intrusion patterns from a col...

Journal: :IJDCF 2016
Chunlin Lu Yue Li Mingjie Ma Na Li

Artificial Neural Networks (ANNs), especially back-propagation (BP) neural network, can improve the performance of intrusion detection systems. However, for the current network intrusion detection methods, the detection precision, especially for lowfrequent attacks, detection stability and training time are still needed to be enhanced. In this paper, a new model which based on optimized BP neur...

2017
Kuo Zhao Liang Hu

With the rapid development and comprehensive application of network technology, network security problems gradually appear serious. Traditional firewall technologies can’t provide sufficient security protection against various attacks and intrusions (Anderson, 1980), while intrusion detection systems (IDS) are faced with compromise between false alarms and false positives (Denning, 1987). In th...

2011
Muamer N. Mohammad Norrozila Sulaiman Emad T. Khalaf

Problem statement: Past few years have witnessed a growing recognition of intelligent techniques for the construction of efficient and reliable Intrusion Detection Systems (IDS). Many methods and techniques were used for modeling the IDS, but some of them contribute little or not to resolve it. Approach: Intrusion detection system for local area network by using Support Vector Machines (SVM) wa...

2008
Pokkuluri Kiran Sree Inampudi Ramesh Babu

Ad hoc wireless network with their changing topology and distributed nature are more prone to intruders. The network monitoring functionality should be in operation as long as the network exists with nil constraints. The efficiency of an Intrusion detection system in the case of an ad hoc network is not only determined by its dynamicity in monitoring but also in its flexibility in utilizing the...

2012
Dewan Md. Farid Mohammad Zahidur Rahman Chowdhury Mofizur Rahman

Intrusion detection is the method of identifying intrusions or misuses in a computer network, which compromise the confidentiality and integrity of the network. Intrusion Detection System (IDS) is a security tool used to monitor network traffic and detect unauthorized activities in the network [23, 28, 30]. A security monitoring surveillance system, which is an intrusion detectionmodel based on...

2012
Zoltán Czirkos Gábor Hosszú

The two important problems of collaborative intrusion detection are aggregation and correlation of intrusion events. The enormous amount of data generated by detection probes requires significant network and computational capacity to be processed. In this article we show that a distributed hash table based approach can reduce both network and computational load of intrusion detection, while pro...

2009
Rennie de Graaf Islam Hegazy Jeffrey Horton Reihaneh Safavi-Naini

Sensors in a wireless sensor network depend on their neighbours to route their messages. Yet, routing protocols in wireless sensor network are vulnerable to different types of attacks. In this paper, we consider the wormhole attack in which the adversary diverts traffic from one part of the network to another part by introducing a low cost tunnel between the two parts. We introduce a distribute...

1998
Steven A. Hofmeyr Stephanie Forrest

This paper introduces a method of distributed network intrusion detection which scales with the number of computers on a network and is tunable (the probability of detection can be traded off against overhead). Experiments with real network traffic show that the system has high detection rates for several common routes of intrusion, and low false-positive rates under normal behavior. The method...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید