نتایج جستجو برای: intrusion detection system ids

تعداد نتایج: 2690345  

2001
Robert S. Sielken Anita K. Jones

Operating system intrusion detection systems (OS IDS) are frequently insufficient to catch internal intruders who neither significantly deviate from expected behavior nor perform a sequence of specific intrusive actions. We hypothesize that application intrusion detection systems (AppIDS) can use application semantics to detect more subtle attacks such as those carried out by internal intruders...

2011
Ibrahim Elhenawy Ahmed Hassan Nancy Awadallah

Network attacks have become the fundamental threat to today's largely interconnected computer system. Intrusion detection system (IDS) is indispensable to defend the system in the face of increasing vulnerabilities. While a number of information visualization software frameworks exist, creating new visualizations, especially those that involve novel visualization metaphors, interaction techniqu...

2015
Jianping Li Siyuan Zhao

While the network brings convenience to people, its own fragility offers intrusion opportunities for hackers and malicious attackers. Along with the diversity and complexity of intrusion attack, high performance intrusion detection techniques are required, and so the study of on-line detection, adaptive detection and multiclass detection techniques becomes current hotspot. To improve the perfor...

2017
Ruchi Jain Anand Singh Rajawat

Intrusion detection system (IDS) is a kind of security management model that can be installed in computers and networks. IDS gather information from the network and computer and analyses it to find the possible security breaches into the system, which contain both intrusions and misuse. If we see modern IDS they also have few vulnerabilities, these systems also have drawbacks of false detection...

2003
Adam G. Pennington John D. Strunk John Linwood Griffin Craig A. N. Soules Garth R. Goodson Gregory R. Ganger

Storage-based intrusion detection allows storage systems to watch for data modifications characteristic of system intrusions. This enables storage systems to spot several common intruder actions, such as adding backdoors, inserting Trojan horses, and tampering with audit logs. Further, an intrusion detection system (IDS) embedded in a storage device continues to operate even after client system...

2004
Vasilis Chatzigiannakis Georgios Androulidakis Mary Grammatikou Basil S. Maglaris

Intrusion Detection Systems (IDS) have been developed to solve the problem of detecting the attacks on several network systems. In small-scale networks a single IDS is sufficient to detect attacks but this is inadequate in large-scale networks, where the number of packets across the network is enormous. In this paper, we present an Architectural Framework considering the large-scale network env...

2017
Rachana Dubey Deepak Rathore Deepak Kushwaha Jay Prakash Maurya

The use of computer more and more need to be increase the security day by day in a real world, the process of monitoring the computer system in a secure way for an unknown and known attack increase the availability and confidentiality of the system, the system provides the solution of such a problem is known as an Intrusion detection system. Intrusion detection systems play a vital role in netw...

Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...

2014
Niva Das Tanmoy Sarkar

-------------------------------------------------------------------ABSTRACT--------------------------------------------------------------With invent of new technologies and devices, Intrusion has become an area of concern because of security issues, in the ever growing area of cyber-attack. An intrusion detection system (IDS) is defined as a device or software application which monitors system ...

Journal: :Computer Communications 2014
Neminath Hubballi Vinoth Suryanarayanan

A network based Intrusion Detection System (IDS) gathers and analyzes network packets and report possible low level security violations to a system administrator. In a large network setup, these low level and partial reports become unmanageable to the administrator resulting in some unattended events. Further it is known that state of the art IDS generate many false alarms. There are techniques...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید