نتایج جستجو برای: web intrusion detection system

تعداد نتایج: 2839330  

Journal: :CoRR 2013
Saravanan Kumarasamy B. Hemalatha P. Hashini

Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process. Two types of intrusion detection systems are available. They are a...

2013
V. P. Singh Parneet Kaur

Assuring secure and reliable operation of networks has become a priority research area these days because of ever growing dependency on network technology. Intrusion detection systems (IDS) are used as the last line of defence. IDS identifies patterns of known intrusions (misuse detection) or differentiates anomalous network data from normal data (anomaly detection). In this paper, a novel Intr...

2014
Mohit Angurala Malti Rani

This paper gives a new approach called Component based software engineering for designing an intrusion detection system. This paper also tells that before this component based software approach, other traditional approaches were used for designing intrusion detection system. But due to various drawbacks we proposed this component based approach for intrusion detection system. A comparison table...

2015
Francisco Bolivar

As part of the Siemens Building Technologies Division, the business segment and intrusion detection products and systems plus video surveillance products. Siemens Energy provides its customers with the latest tecnology in Intrusion Detection Systems (IDS) Siemens Corporate Research Modern intrusion detection systems (IDSes) for virtualized environments are 2.1 VMM-Based Intrusion Detection Syst...

2002
Alfonso Valdes Magnus Almgren Steven Cheung Yves Deswarte Bruno Dutertre Joshua Levy Hassen Saïdi Victoria Stavridou Tomás E. Uribe

We describe a general architecture for intrusion-tolerant enterprise systems and the implementation of an intrusion-tolerant Web server as a specific instance. The architecture comprises functionally redundant COTS servers running on diverse operating systems and platforms, hardened intrusion-tolerance proxies that mediate client requests and verify the behavior of servers and other proxies, an...

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

2011
Sushama Shirke

This is an implementation of the Wireless LAN Intrusion Detection System (WIDS ) using clock-skews as a fingerprinting property as suggested by Jana-Kasera [1]. Our objective is to detect the presence of a fake access point (AP) in a Wireless LAN (WLAN). Use of clock -skew enables us to effectively detect Medium Access Control (MAC) Address spoofing. The principle used in this project is that c...

2009
Wei Wang Thomas Guyet Svein J. Knapskog

Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns ability of self-managing: selflabeling, self-updating and self-adapting. Affinity Propagation (AP) uses the framework to learn a subject’s behavior through dynamical clustering of the streaming data. The testing results...

Journal: :CoRR 2010
Hamdan O. Alanazi Rafidah Md. Noor B. B. Zaidan A. A. Zaidan

Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM. ANN is one of the oldest systems that have been used for Intrusion Detection System (IDS), which presents supervised lea...

2014
Leandros A. Maglaras Jianmin Jiang

In this paper we present a intrusion detection module capable of detecting malicious network traffic in a SCADA (Supervisory Control and Data Acquisition) system. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM (One-Class Support Vector Machine) is an intrusion detection mechanism that does not need any labeled data for training or an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید