نتایج جستجو برای: network intrusion detection
تعداد نتایج: 1198390 فیلتر نتایج به سال:
In order to improve network intrusion detection precision, this paper proposed a network intrusion detection model based on simultaneous selecting features and parameters of support vector machine (SVM) by particle swarm optimization (PSO) algorithm. Firstly, the features and parameters of SVM are coded to particle, and then the PSO is used to find the optimal features and SVM parameters by col...
Proliferation of network systems and growing usage of Internet make network security issue to be more important. Intrusion detection is an important factor in keeping network secure. The main aim of intrusion detection is to classify behavior of a system into normal and intrusive behaviors. However, the normal and the attack behaviors in networks are hard to predict as the boundaries between th...
The widespread usage of internet application through wireless medium along with the wired medium has made the internet server to be one for combined wired and wireless network. The criteria for adapting intrusion detection in wireless scenario are different from the traditional wired intrusion detection. The wired network routing and data transmission lies in the standard physical routing. Howe...
An Intruder is a hacker or cracker which always tries to get access to secure, system Intrusion occurs when an unauthorized person try to gain access or interrupt the normal operations of an information system. Even when such attacks ar e self-propagating, as in the case o f worms, Trojan Horses and denial-of service attacks, they are almost always initiated by an individual whose purpose is to...
Assuring secure and reliable operation of networks has become a priority research area these days because of ever growing dependency on network technology. Intrusion detection systems (IDS) are used as the last line of defence. IDS identifies patterns of known intrusions (misuse detection) or differentiates anomalous network data from normal data (anomaly detection). In this paper, a novel Intr...
With the growth of hacking and exploiting tools and invention of new ways of intrusion, Intrusion detection and prevention is becoming the major challenge in the world of network security. It is becoming more demanding due to increasing network traffic and data on Internet. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not co...
Intrusion Detection Systems (IDS) are a very popular network security tool. These tools can allow network administrators, to identify and react to hostile traffic aimed at, or generated from their own network. In general there are two common Intrusion Detection approaches which are behavior or traffic anomaly based and knowledge or signature based. As a result of the increased sophistication of...
Since wireless resources are limited, an efficient way of utilizing wireless resources is needed in selecting IDSs. We propose a monitoring node selection scheme for intrusion detection in congested wireless sensor network. Network congestion is an important issue in mobile network. The network congestion does not guarantee a proper detection rate and congested networks should cause an unreliab...
Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Artificial Intelligence plays a driving role in security services. This paper proposes a dynamic model Intelligent Intrusion Detection System, based on specific AI approach for intrusion detection. The techniques tha...
In order to enhance efficiency of intrusion detection in the Mobile Ad hoc NETwork (MANET), an intrusion prediction method based on intelligent immune threshold matching algorithm was presented. Using a dynamic load-balancing algorithm, wireless network data packet was distributed to a set of analysis subsystem by the balance subsystem; it could avoid packet loss and false negatives in high-per...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید