نتایج جستجو برای: intrusion response system

تعداد نتایج: 3050974  

Journal: :CoRR 2012
Rajdeep Borgohain

-------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics i...

2003
Mikhail Gordeev

Intrusion detection plays one of the key roles in computer system security techniques. This paper is dedicated to this topic. It describes major approaches to intrusion detection and focuses on methods used by intrusion detection systems. We do not describe in this paper details of existing intrusion detection system. Instead, we concentrate on underlying principles and methods. This paper can ...

2015

Intrusion behavior has the characteristics of fast upgrade, strong concealment In this paper, an integrated network intrusion detection algorithm by combining. judge the safety of a system or network. (6). Intrusion Detection Systems (IDS) are primarily centered on characteristic probable incidents, observation data. ABSTRACT: Intrusion Detection Systems are designed to detect system attacks Re...

2002
Peng Ning Yun Cui

Current intrusion detection systems (IDSs) usually focus on detecting low-level attacks and/or anomalies; none of them can capture the logical steps or attack strategies behind these attacks. Consequently, the IDSs usually generate a large amount of alerts. In situations where there are intensive intrusive actions, not only will actual alerts be mixed with false alerts, but the amount of alerts...

Journal: :Wireless Personal Communications 2011
Jin-Hee Cho Ing-Ray Chen

Under highly security vulnerable, resource-restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while bounding the communication response time for mission-oriented mobile groups. In this paper, we analyze the tradeoff of security versus performance for distributed intrusion detection protocols employed in mobile group communi...

2010
Nizar Kheir Nora Cuppens-Boulahia Frédéric Cuppens Hervé Debar

Information systems are increasingly dependent on highly distributed architectures that include multiple dependencies. Even basic attacks like script-kiddies have drastic effects on target systems as they easily spread through existing dependencies. Unless intrusion effects are accurately assessed, response systems will still be blinded when selecting optimal responses. In fact, using only resp...

2012

In this chapter, a cross-layer based intrusion detection technique for wireless networks is proposed. The proposed technique uses a combined weight value that is computed from the received signal strength (RSS) and time taken for RTS-CTS Handshake (TT). 3.1 Introduction The rapid proliferation of wireless local area networks has changed the landscape of network security. The traditional way of ...

Journal: :CoRR 2011
Hichem Sedjelmaci Mohammed Feham

Network security is one of the major concerns of studies have been conducted on the intrusion detection system. Cluster-based Wireless A novel hybrid intrusion detection method method for wireless sensor networks. Accepted papers & International Conference on Advanced Wireless, Paper title:A Low-Complex Coverage Eligibility Algorithm For Wireless Sensor Networks. Paper title: A Novel Cluster He...

2016
Anshul Atre Rajesh Singh

Intrusion Detection System (IDS) which is increasing the key element of system security is used to identify the malicious activities in a computer system there are different approaches being employed in intrusion detection systems. The prediction process may produce false alarms in many anomaly based intrusion detection systems. With the concept of fuzzy logic, the false alarm rate in establish...

2006
Tran Van Phuong Le Xuan Hung Seong Jin Cho Young-Koo Lee Sungyoung Lee

Wide applications of Wireless Sensor Networks also make them more interesting to adversaries. WSNs’ protocols are designed without security in mind so they are susceptible to many types of attacks. Some preventive mechanisms are deployed to protect WSNs but they are not enough. Thus, WSNs need an Intrusion Detection System (IDS) to detect intrusion of adversaries to response and diminish the da...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید