نتایج جستجو برای: intrusion detection system ids
تعداد نتایج: 2690345 فیلتر نتایج به سال:
Nowadays the organizations are facing the number of threats every day in the form of viruses and attack etc. Since many different mechanisms were preferred by organizations in the form of intrusion detection and prevention system to protect its organizations from these kinds of attacks. Intrusion Detection System (IDS) is considered as a system integrated with intelligent subsystems. In this pa...
The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, software patches to enable 802.11 wireless intrusion detection capability in Snort have been released. This paper focuses on the lessons learned from a live deployment of these wireless extensions to the Snort IDS. Gener...
detection and prevention (gateways, firewalls, IDS/IPS), tracking, tracing Another reason is the Protect data privacy against insider attacks: traceable system. However defending organizations from insider attacks is becoming a In that case, the retail company was informed by a malware detection system of intrusion, but the delayed because their other security tools failed to detect the intrusion.
The security of a computer system is compromised when an intrusion takes place. The popularization of shared networks and Internet usage demands increases attention on information system security. Importance of Intrusion detection system (IDS) in computer network security well proven. Data mining approach can play very important role in developing intrusion detection system. Classification is i...
Wireless Sensor Networks (WSNs) have been employed in many real-world applications that greatly improve our life. by applying a genetic operator. However, the Intrusion detection systems in wireless sensor networks: A review. Intrusion Detection System (IDS) provides a solution to this problem by analysing the network in order to detect abnormal behaviour of the sensor node(s). A well designed ...
Intrusion Detection System has been studied for more than ten years. Though Artificial Intelligence (AI) techniques have been integrated to improve IDS but the success is still far from satisfaction. Thus, we believe a new strategy to improve IDS is badly needed. One of the solutions is by imitating the honeybee colony that can successfully protect their colony. In fact, the honeybee colony sys...
Computer security has become a major problem in our society. In particular, computer network security is concerned with preventing the intrusion of an unauthorized person into a network of computers. An intrusion detection system (IDS) is a tool to monitor the network traffic and users’ activity with the aim of distinguishing between hostile and non-hostile traffic. Snort is an IDS available un...
Over the past decade, Intrusion Detection Systems (IDS) have improved steadily in the efficiency and effectiveness with which they detect intrusive activity. This is particularly true with signature-based IDS due to progress with intrusion analysis and intrusion signature specification. At the same time system complexity, overall numbers of bugs and security vulnerabilities have been on the inc...
This paper is a survey of the work, done for making an IDS fault tolerant. IDS are prone to various attacks and it becomes the natural primary target of hostile attacks with the aim of disabling the detection feature and allowing an attacker to operate without being detected. This paper suggests that intrusion detection system (IDS) must be fault tolerant; otherwise, the intruder may first subv...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید