نتایج جستجو برای: layered intrusion

تعداد نتایج: 51992  

2009
Luigi Coppolino Salvatore D'Antonio Ivano Alessandro Elia Luigi Romano

Currently available products only provide some support in terms of Intrusion Prevention and Intrusion Detection, but they very much lack Intrusion Diagnosis features. We discuss the limitations of current Intrusion Detection System (IDS) technology, and propose a novel approach which we call Intrusion Detection & Diagnosis System (IDS) technology to overcome such limitations. The basic idea is ...

2003
DAN GORTON Dan Andersson Martin Fong

Intrusion detection is an important security tool. It has the possibility to provide valuable information about the current status of security. However, as enterprises deploy multiple intrusion detection sensors at key points in their networks, the issue of correlating messages from these sensors becomes increasingly important. A correlation capability reduces alert volume, and potentially impr...

2011
M. Thangavel P. Thangaraj

Problem statement: Wireless LAN IEEE 802.11 protocols are growing rapidly and security has always been a concern with the security of wired network. Wireless networks encountered threats from unauthorized access to network resources, installation of access points and illegal sniffing (refer as classical intrusion threats). In its current hybrid wired and wireless network attacks on the generall...

2007
AIKATERINI MITROKOTSA NIKOS KOMNINOS CHRISTOS DOULIGERIS

Ad hoc networks have received great attention in recent years, mainly due to their important advantages and their growing demand. Nevertheless, ad hoc networks present many inherent vulnerabilities and demand efficient security mechanisms in order to be safeguarded. An efficient intrusion detection approach combined with an authenticated intrusion response can act as an effective line of defens...

2015
Supriya Khobragade Puja Padiya

The goal of Distributed Intrusion Detection System is to analyze events on the network and identify attacks. The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS). There is a difficulty to find intrusion in an distributed network segment from inside as w...

2014
Sivaprakash

The intrusion detection system identifies the legitimate and attackers in the network area. The intrusion detection system is designed in two categories. In the first model a system component is used for monitoring the security of a WSN and diagnosing compromised or vulnerable. Second model is the monitoring or surveillance system for detecting a malicious intruder that invades the network doma...

This paper extends the previous work of authors and presents a non-layered Finite Volume formulation for the elasto-plastic analysis of Mindlin-Reissner plates. The incremental algorithm of the elasto-plastic solution procedure is shown in detail. The performance of the formulation is examined by analyzing of plates with different boundary conditions and loading types. The results are illustrat...

2013
Xiaoping Li

Network security is one of the most important issues in the field of computer science. The network intrusion may bring disaster to the network users. It is therefore critical to monitor the network intrusion to prevent the computers from attacking. The intrusion pattern identification is the key point in the intrusion detection. The use of the support vector machine (SVM) can provide intelligen...

Journal: :I. J. Network Security 2017
Vrushank M. Shah A. K. Agarwal

Alert Fusion is a process of combining alerts from multiple Intrusion Detection Systems to make a decision about the presence of attack or intrusion. A reliable decision from an alert fusion requires that Intrusion detectors involved in the fusion process generates fully reliable alerts. The unreliable alerts from intrusion detectors may completely misleads the decision making process. The exis...

Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید