نتایج جستجو برای: intrusion response system
تعداد نتایج: 3050974 فیلتر نتایج به سال:
In this work we present a structured and consistent methodology for evaluating cost of intrusion responses. The proposed approach provides consistent basis for response evaluation across different systems while incorporating security policy and properties of specific system environment. The advantages of the proposed cost model were evaluated via simulation process. The proliferation of complex...
The mobile adhoc network (MANET) requires effective intrusion response system. In this paper, we present an intrusion response system that supports the infrastructureless nature of MANETs. We propose a NHELLO and Link Layer based solution towards excluding malicious node which is robust against address spoofing from the attacker. In particular, we investigate how power adaption can be used to k...
t – A prototype implementation of a wireless intrusion n and active response system is described. An off the ireless access point was modified by downloading a new operating system with non-standard wireless access unctionality in order to implement a wireless intrusion n system that has the ability to actively respond to ed threats. An overview of the characteristics and nality required in a w...
A Swarm-intelligence-based intrusion detection technique is proposed to in order to reduce the misjudgment & misdetection and increase the real-time response in the existing intrusion detection techniques show. Separating a huge and complicated intrusion detection system into severer independent detection units with unique function so that the amount of detection data processing and the complex...
Traditional Intrusion Detection Systems (IDSs) work in isolation from access control for the application the systems aim to protect. The lack of coordination and inter-operation between these components prevents detecting sophisticated attacks and responding to ongoing attacks in real time, before they cause damage. Another disadvantage is a large number of false positives. Reports of attacks c...
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion pre...
_ Mobile Ad Hoc Networks (MANET) is varied from other networks mainly by its self-configuring and selfoptimizing nature. Being the flexible network, MANET is exposed to various types of attacks mainly the routing attacks is currently in the networking system. To reduce certain attack possibilities, prevention methods such as intrusion detection system, intrusion prevention, authentication and e...
Smart phones have recently become increasingly popular because they provide “all-in-one” convenience by integrating traditional mobile phones with handled computing devices. Unfortunately these mobile devices are beginning to face many of the same security threats as desktops. Since smart phones software architecture is similar to the PCs software architecture, they are vulnerable to similar ty...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید