نتایج جستجو برای: intrusion detection systems idss

تعداد نتایج: 1697787  

Journal: :Empirical Software Engineering 2021

Abstract Diverse layers of defence play an important role in the design defence-in-depth architectures. The use Intrusion Detection Systems (IDSs) are ubiquitous this design. But selection “right” IDSs various configurations is decision that security architects need to make. Additionally, ability these adapt evolving threat-landscape also needs be investigated. To help with decisions, we rigoro...

1999
Wenke Lee Salvatore J. Stolfo Kui W. Mok

There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are constructed by manual encoding of expert knowledge, changes to IDSs are expensive and slow. In this paper, we describe a data mining framework for adaptively building Intrusion Detection (ID) models. The central idea is to util...

2008
Frederic Massicotte Lionel C. Briand Yvan Labiche

An Intrusion Detection System (IDS) protects computer networks against attacks and intrusions, in combination with firewalls and anti-virus systems. An IDS is therefore a crucial element of a network security posture. One class of IDS is called signature-based network IDSs as they monitor network traffic, looking for evidence of malicious behavior as specified in attack descriptions (referred t...

Journal: :EURASIP J. Adv. Sig. Proc. 2009
Mohamed Hamdi Amel Meddeb-Makhlouf Noureddine Boudriga

The rapid proliferation of mobile applications and services has introduced new vulnerabilities that do not exist in fixed wired networks. Traditional security mechanisms, such as access control and encryption, turn out to be inefficient in modern wireless networks. Given the shortcomings of the protection mechanisms, an important research focuses in intrusion detection systems (IDSs). This pape...

Journal: :Computers & Security 2011
Christos Xenakis Christoforos Panos Ioannis Stavrakakis

Mobile Ad Hoc Networks (MANETs) are susceptible to a variety of attacks that threaten their operation and the provided services. Intrusion Detection Systems (IDSs) may act as defensive mechanisms, since they monitor network activities in order to detect malicious actions performed by intruders, and then initiate the appropriate countermeasures. IDS for MANETs have attracted much attention recen...

2009
Wei Lu Hengjian Tong

Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and report a huge number of false alarms. The hybrid approach has been proposed recently to improve the performance of intrusion detection systems (IDSs). A big challenge for constructing such a multi-sensor based IDS is how to mak...

2009
Guillermo Suarez-Tangil Esther Palomar José María de Fuentes Jorge Blasco Alís Arturo Ribagorda

The widespread adoption of autonomous intrusion detection technology is overwhelming current frameworks for network security management. Modern intrusion detection systems (IDSs) and intelligent agents are the most mentioned in literature and news, although other risks such as broad attacks (e.g. very widely spread in a distributed fashion like botnets), and their consequences on incident respo...

2005
Wei Wang Roberto Battiti

Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intrusion detection methods cannot process large amounts of audit data for real-time operation. In this paper, we propose a novel method for intrusion identification in computer networks based on Principal Component Analys...

1999
Wenke Lee Salvatore J. Stolfo Kui W. Mok

There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are constructed by manual encoding of expert security knowledge, changes to IDSs are expensive and slow. In this paper, we describe a data mining framework for adaptively building Intrusion Detection (ID) models. The central idea i...

2005
Guofei Gu Prahlad Fogla David Dagon Wenke Lee Boris Škorić

A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate an intrusion detection system (IDS) in terms of its ability to correctly classify events as normal or intrusion. In this paper, we provide an in-depth analysis of existing metrics. We argue that the lack of a single unified metric makes it difficult to fine tune and evaluate an IDS. The intrusion ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید