نتایج جستجو برای: intrusion response system

تعداد نتایج: 3050974  

Journal: :International Journal of Computational Intelligence Systems 2012

2008
Natalia Stakhanova Chris Strasburg Samik Basu Johnny S. Wong

In this work we present a structured and consistent methodology for evaluating cost of intrusion responses. The proposed approach provides consistent basis for response evaluation across different systems while incorporating security policy and properties of specific system environment. The advantages of the proposed cost model were evaluated via simulation process. The proliferation of complex...

2010
Manoj Kumar Akshay Girdhar

The mobile adhoc network (MANET) requires effective intrusion response system. In this paper, we present an intrusion response system that supports the infrastructureless nature of MANETs. We propose a NHELLO and Link Layer based solution towards excluding malicious node which is robust against address spoofing from the attacker. In particular, we investigate how power adaption can be used to k...

2003
Yu-Xi Lim Tim Schmoyer John G. Levine Henry L. Owen

t – A prototype implementation of a wireless intrusion n and active response system is described. An off the ireless access point was modified by downloading a new operating system with non-standard wireless access unctionality in order to implement a wireless intrusion n system that has the ability to actively respond to ed threats. An overview of the characteristics and nality required in a w...

2006
Zhou Lianying

A Swarm-intelligence-based intrusion detection technique is proposed to in order to reduce the misjudgment & misdetection and increase the real-time response in the existing intrusion detection techniques show. Separating a huge and complicated intrusion detection system into severer independent detection units with unique function so that the amount of detection data processing and the complex...

2004
Tatyana Ryutov Clifford Neuman Li Zhou

Traditional Intrusion Detection Systems (IDSs) work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between these components prevents detecting sophisticated attacks and responding to ongoing attacks in real time, before they cause damage. Another disadvantage is a large number of false positives. Reports of attacks c...

Journal: :CoRR 2010
Mohammad Saiful Islam Mamun A. F. M. Sultanul Kabir

In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion pre...

2013
M. MANJULA K. RAVIKUMAR

_ Mobile Ad Hoc Networks (MANET) is varied from other networks mainly by its self-configuring and selfoptimizing nature. Being the flexible network, MANET is exposed to various types of attacks mainly the routing attacks is currently in the networking system. To reduce certain attack possibilities, prevention methods such as intrusion detection system, intrusion prevention, authentication and e...

2012
G. Hemaprabha

Smart phones have recently become increasingly popular because they provide “all-in-one” convenience by integrating traditional mobile phones with handled computing devices. Unfortunately these mobile devices are beginning to face many of the same security threats as desktops. Since smart phones software architecture is similar to the PCs software architecture, they are vulnerable to similar ty...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید