نتایج جستجو برای: intrusion detection system

تعداد نتایج: 2688299  

2016

This Learn About discusses the complex security threats businesses are facing and how the technology behind intrusion detection and prevention (IDP) can prevent attacks on business networks. Juniper Networks has offered IDP for years, and today it is implemented on thousands of business networks by the Juniper Networks SRX Series Services Gateways and Juniper Networks JSA Series Secure Analytic...

2016
Stelios Sidiroglou Jeff Perkins Martin Rinard PHILIP D. MUMFORD DAVID G. HAGSTROM

2007
Rachel Bonas

In Distributed Intrusion Detection Systems (DIDS) data is collected from various sources, correlated, and used to determine if systems are under attack or have been compromised. The use of DIDS allows for increased security as there is a broader view of incidents transpiring across the entire network. With data coming from different sources, the problem of correlating and analyzing such large a...

2013
Sherif M. Badr

Intrusion Detection System (IDS) is one of a crucial issue and a major research problem in network security. This work, An Adaptive multi-Layer Intrusion Detection System (ALIDS) is designed and developed to achieve high efficiency, scalability, flexibility and improve the detection and classification rate accuracy. We apply C5 decision tree on our model. Our experimental results showed that th...

2011
Purvag Patel Chet Langin Feng Yu Shahram Rahimi

Our research created a network Intrusion Detection Math (ID Math) consisting of two components: (1) a way of specifying intrusion detection types in a manner which is more suitable for an analytical environment; and (2) a computational model which describes methodology for preparing intrusion detection data stepwise from network packets to data structures in a way which is appropriate for sophi...

2009
Kyusuk Han Hyeran Mun Chan Yeob Yeun Kwangjo Kim

Recent reports show that the loss from the malicious intrusion by insiders is more serious than by outsiders. Despite that the various attacks are occurred by insiders and outsiders, most work has been focused on the intrusion detection against outsider attacks. In this paper, we improve the Wang et al.’s insider predection model [15] and propose the combined model with access control for the e...

2006
Jinqiao Yu Y. V. Ramana Reddy Sumitra Reddy

Due to many inherent deficiencies and flaws, current intrusion detection systems (IDS) are plagued by numerous problems. Intrusion Detection Systems are often inefficient and ineffective when used alone. IDS products need to be fully integrated into the security defense line. Intrusion alert analysis and management are crucial in achieving this. In this paper, we describe an intrusion detection...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید