نتایج جستجو برای: host based intrusion detection

تعداد نتایج: 3501797  

2003
Katherine A. Heller Krysta M. Svore Angelos D. Keromytis Salvatore J. Stolfo

We present a new Host-based Intrusion Detection System (IDS) that monitors accesses to the Microsoft Windows Registry using Registry Anomaly Detection (RAD). Our system uses a one class Support Vector Machine (OCSVM) to detect anomalous registry behavior by training on a dataset of normal registry accesses. It then uses this model to detect outliers in new (unclassified) data generated from the...

Journal: :Digital Threats: Research and Practice 2021

Journal: :journal of King Abdulaziz University Computing and Information Technology Sciences 2019

2015
Md Tarik Amandeep Singh

The goal of a this IDS is to identify malicious behaviour that targets a network or a host and its resources. Intrusion detection parameters are numerous and in many cases they present uncertain and imprecise causal relationships which can affect attack types. A Bayesian Network here used is a graphical modeling tool which used to model decision problems containing uncertainty. BN and K2 learni...

Journal: :iranian journal of fuzzy systems 2014
mohammad reza moosavi mahsa fazaeli javan mohammad hadi sadreddini mansoor zolghadri jahromi

predicting different behaviors in computer networks is the subject of many data mining researches. providing a balanced intrusion detection system (ids) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

2015
Amr S. Abed T. Charles Clancy David S. Levy

Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical operational requirement. This paper introduces a realtime host-based intrusion detection system that can be used to passively detect malfeasance against applications within ...

Journal: :IJISP 2010
Ran Tao Li Yang Lu Peng Bin Li

Application features like port numbers are used by Network-based Intrusion Detection Systems (NIDSs) to detect attacks coming from networks. System calls and the operating system related information are used by Host-based Intrusion Detection Systems (HIDSs) to detect intrusions toward a host. However, the relationship between hardware architecture events and Denial-of-Service (DoS) attacks has ...

1999
Aaron Schwartzbard Anup K. Ghosh

Windows NT has become the dominant desktop platform. To date, host-based intrusion detection research has focused on Unixavored platforms. As a result, we have a large gap between the platform people use in practice and the platforms on which intrusion detection research is active. In this paper, we examine the feasibility of applying host-based intrusion detection to the Windows NT platform. S...

2005
Zonghua Zhang

Anomaly-based intrusion detection is about discerning intrusive and normal patterns of activities based on the normality characterization of information systems. The common goal of anomaly-based intrusion detection is to detect intrusive attacks as many as possible with fewer false alerts. Generally, our work is to study effective models, methods and techniques for anomaly-based intrusion detec...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید باهنر کرمان - دانشکده ریاضی و کامپیوتر 1391

امروزه با گسترش شبکه های کامپیوتری، بحث امنیت شبکه بیش از گذشته مورد توجه پژوهشگران قرار گرفته است. در این راستا تشخیص نفوذ به عنوان یکی از اجزای اصلی برقراری امنیت در شبکه های کامپیوتری شناخته می شود. شناسایی نفوذ در شبکه های کامپیوتری و جلوگیری از آن به عنوان یکی از مباحث اصلی در همایش های امنیتی جوامع پیشرفته مطرح می باشد. در این راستا روش های گوناگونی جهت مقابله با حملات در قالب سیستم های ت...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید