نتایج جستجو برای: layered intrusion
تعداد نتایج: 51992 فیلتر نتایج به سال:
The current network is complicated due to the high throughput and the multi-uniformity of actions. An intrusion detection system is a critical component for secure information management. Network Intrusion Detection Systems, which are part of the layered defense scheme, must be able to meet these organizational objectives in order to be effective. This work presents the investigations carried o...
Information hiding techniques can be used by criminals and terrorists to communicate over covert channels within the TCP/IP protocol suite and can be used to overcome firewalls and most other forms of network intrusion detection and prevention systems. In this work we describe the covert channel concept and weaknesses in the five layered TCP/IP layered model. We then present an evaluation frame...
چکیده ندارد.
An intrusion detection system framework using mobile agents is a layered framework mechanism designed to support heterogeneous network environments to identify intruders at its best. Traditional computer misuse detection techniques can identify known attacks efficiently, but perform very poorly in other cases. Anomaly detection has the potential to detect unknown attacks; however, it is a very ...
With the ever increasing numberand diverse type of attacks, including new and previouslyunseen attacks, the effectiveness of an Intrusion DetectionSystem is very important. Hence there is high demand to reduce the threat level in networks to ensure the data and services offered by them to be more secure. In this paper we developed an effective test suite for improving the efficiency and accurac...
Abstract. Increasing melt of ice sheets at their floating or vertical interfaces with the ocean is a major driver marine sheet retreat and sea level rise. However, extent to which warm, salty seawater may drive melting under grounded portions still not well understood. Previous work has explored possibility that dense intrudes beneath relatively light subglacial freshwater discharge, similar “s...
Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Due to complex and dynamic nature of computer networks and hacking techniques, detecting malicious activities remains a challenging task for secu...
Internet provides huge information and value to the users but at the same time access to the internet is prone to increasing number of attacks. Due to vulnerabilities in the network system, protecting network from malicious activities is prime concern today. It is important to analyse vulnerabilities and record them so that future attacks can be predicted. In this paper vulnerabilities which ex...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید