نتایج جستجو برای: layered intrusion

تعداد نتایج: 51992  

2010
S. Saravanakumar

The current network is complicated due to the high throughput and the multi-uniformity of actions. An intrusion detection system is a critical component for secure information management. Network Intrusion Detection Systems, which are part of the layered defense scheme, must be able to meet these organizational objectives in order to be effective. This work presents the investigations carried o...

Journal: :First Monday 1997
David Llamas Alan Miller Colin Allison

Information hiding techniques can be used by criminals and terrorists to communicate over covert channels within the TCP/IP protocol suite and can be used to overcome firewalls and most other forms of network intrusion detection and prevention systems. In this work we describe the covert channel concept and weaknesses in the five layered TCP/IP layered model. We then present an evaluation frame...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده علوم 1387

چکیده ندارد.

Journal: :CoRR 2009
N. Jaisankar R. Saravanan K. Durai Swamy

An intrusion detection system framework using mobile agents is a layered framework mechanism designed to support heterogeneous network environments to identify intruders at its best. Traditional computer misuse detection techniques can identify known attacks efficiently, but perform very poorly in other cases. Anomaly detection has the potential to detect unknown attacks; however, it is a very ...

2013
Arpitha M Geetha V

With the ever increasing numberand diverse type of attacks, including new and previouslyunseen attacks, the effectiveness of an Intrusion DetectionSystem is very important. Hence there is high demand to reduce the threat level in networks to ensure the data and services offered by them to be more secure. In this paper we developed an effective test suite for improving the efficiency and accurac...

Journal: :The Cryosphere 2022

Abstract. Increasing melt of ice sheets at their floating or vertical interfaces with the ocean is a major driver marine sheet retreat and sea level rise. However, extent to which warm, salty seawater may drive melting under grounded portions still not well understood. Previous work has explored possibility that dense intrudes beneath relatively light subglacial freshwater discharge, similar “s...

2012
Deepa Guleria

Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Due to complex and dynamic nature of computer networks and hacking techniques, detecting malicious activities remains a challenging task for secu...

2011
Kamini Nalavade B. B. Meshram

Internet provides huge information and value to the users but at the same time access to the internet is prone to increasing number of attacks. Due to vulnerabilities in the network system, protecting network from malicious activities is prime concern today. It is important to analyse vulnerabilities and record them so that future attacks can be predicted. In this paper vulnerabilities which ex...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید