نتایج جستجو برای: intrusion

تعداد نتایج: 18427  

2013
P. Amudha S. Karthik S. Sivakumari

Security is becoming a critical part of organizational information systems and security of a computer system or network is compromised when an intrusion takes place. In the field of computer networks security, the detection of threats or attacks is nowadays a critical problem to solve. Intrusion Detection Systems (IDS) have become a standard component in network security infrastructures and is ...

2013
Bin Zeng Lu Yao Rui Wang

A distributed network intrusion detection system (IDS) called SA-NIDS is proposed based on the network-based intrusion detection architecture. It includes three basic components, Local Intrusion Detection Monitor (LIDM), Global Intrusion Detection Controller (GIDC), and Surveillance Agent (SA). Basically, the LIDM is used to do packets capturing, packets de-multiplexing, local intrusion detecti...

Journal: :IJICS 2007
Natalia Stakhanova Samik Basu Johnny S. Wong

Recent advances in the field of intrusion detection brought new requirements to intrusion prevention and response. Traditionally, the response to an attack is manually triggered by an administrator. However, increased complexity and speed of the attack-spread during recent years show acute necessity for complex dynamic response mechanisms. Although intrusion detection systems are being actively...

2015
J. K. Kalita

Consequently, Intrusion Detection Systems (IDS) are quickly becoming a Intrusion Detection System Using Ontology and Clustering Techniques, Book Title. NIDS solutions offer sophisticated, real-time intrusion detection capabilities often Though this method takes time to set up, as baselining requires the NIDS. State-of-the-art intrusion detection, prevention and reaction simulation systems analy...

Journal: :Journal of Computer Security 2005
Meng Yu Peng Liu Wanyu Zang

It is important for critical applications to provide critical services without any integrity or availability degradation in the presence of intrusions. This requirement can be satisfied by intrusion masking techniques under some situations. Compared with intrusion tolerance techniques, where some integrity or availability degradations are usually caused, intrusion masking techniques use substan...

2009
Ruth Rendell

20.1 Intruders Intruder Behavior Patterns Intrusion Techniques 20.2 Intrusion Detection Audit Records Statistical Anomaly Detection Rule-Based Intrusion Detection The Base-Rate Fallacy Distributed Intrusion Detection Honeypots Intrusion Detection Exchange Format 20.3 Password Management Password Protection Password Selection Strategies 20.4 Recommended Reading and Web Sites 20.5 Key Terms, Revi...

2015
M. Caselli E. Zambon J. Petit

In the real time Intrusion Detection system, the main confront is to detect the Anomaly Intrusion Detection system Model with ADWIN change Detector. intrusion detection system, that utilizes machine learning techniques such as single classifier and hybrid build the model was decreased and the detection. Intrusion Detection System (IDS) to detect and prevent cybercrimes to protect these The prop...

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

Ahmadi Khalaji, Ahmad, Kamran, saeed, Rezaei-Kahkhaei , mahdi, Tahmasbi, Zahra,

The Nokeh intrusion exposed in the northern Semnan area. The intrusion is composed of monzonite-quartz monzonite and granite-granodiorite and was intruded in the Eocene carbonaceous tuffs, where the country rocks converted to magnetite-skarn. Plagioclase, orthoclase, quartz, biotite, amphibole and clinopyroxene are the constituent minerals of Nokeh intrusion. The study rocks represent granular,...

1998
Marcelo Medina

Network based distributed intrusion detection is a common trend in several commercial intrusion detection systems. However, network based intrusion detection requires that a security officer comprehends the dynamic and non-deterministic nature of data traffic across the network. This paper provides security officers with a brief introduction to intrusion detection techniques and classifications...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید