نتایج جستجو برای: based intrusion detection
تعداد نتایج: 3328279 فیلتر نتایج به سال:
Today network security has become an everyday problem with virtually all computers connected to the Internet. Intrusion detection serves the important function of identifying malicious activities and determining their nature, origin, and seriousness. Inspired by the many excellent characteristics of biological immune System (BIS), the network intrusion detection system (NIDS) which based on art...
A intrusion provides an unauthorized access, damage or disruption of the network. The process can understand the characteristics and nature of an intruder. The paper presents the taxonomy consists of the specification of an intruder. Taxonomy provides the classification of intruder and provides mechanism for intruder detection. We found the algorithm for developing an intruder which can be atta...
Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical operational requirement. This paper introduces a realtime host-based intrusion detection system that can be used to passively detect malfeasance against applications within ...
Security of computer systems and information in flow is essential to acceptance for every network user utilities Now the standalone computer and internets are exposed to an increasing number of security threats with new types of attacks continuously appearing. For this to develop a robust, flexible and adaptive security oriented approaches is a severe challenge. In this context, anomaly based i...
Application features like port numbers are used by Network-based Intrusion Detection Systems (NIDSs) to detect attacks coming from networks. System calls and the operating system related information are used by Host-based Intrusion Detection Systems (HIDSs) to detect intrusions toward a host. However, the relationship between hardware architecture events and Denial-of-Service (DoS) attacks has ...
Wireless Sensor Networks (WSNs) are currently used in many application areas including military applications, health related applications, control and tracking applications and environment and habitat monitoring applications. The harsh and unattended deployment of these networks along with their resource restrictions makes their security issue very important. Prevention-based security approache...
Intrusion detection system is used to identify anomalous packets in network. It can also identify unauthorized, malicious activity and malicious code in network. Currently, differnet apporaches of network intrusion detection systems are proposed by researchers. The classification based techniques has some issues such as model overfitting and classification evaluation. The challenging task in in...
The continuous evolution of the attacks against computer networks has given renewed strength to research on anomaly based Intrusion Detection Systems, capable of automatically detecting anomalous deviations in the behavior of a computer system. While data mining and learning techniques have been successfully applied in host-based intrusion detection, network-based applications are more difficul...
Securing embedded control systems presents a unique challenge. In addition to the resource restrictions inherent to embedded devices, embedded control systems must accommodate strict, non-negotiable timing requirements, and their massive scale greatly increases other costs such as power consumption. These constraints render conventional host-based intrusion detection – using a hypervisor to cre...
Spoofing with falsified IP-MAC pair is the first step in most of the LAN based-attacks. Address Resolution Protocol (ARP) is stateless, which is the main cause that makes spoofing possible. Several network level and host level mechanisms have been proposed to detect and mitigate ARP spoofing but each of them has their own drawback. In this paper we propose a Host-based Intrusion Detection syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید