نتایج جستجو برای: intrusion response system

تعداد نتایج: 3050974  

2010
Martí Navarro Emilio Corchado Vicente Julián Álvaro Herrero

This paper presents an extension of MOVICAB-IDS, a Hybrid Intelligent Intrusion Detection System characterized by incorporating temporal control to enable real-time processing and response. The original formulation of MOVICAB-IDS combines different Computational Intelligence techniques within a multiagent system to perform Intrusion Detection in dynamic computer networks. This work extends the ...

2003
Sankalp Singh Michel Cukier William H. Sanders

As computer systems become more complex and more widely distributed, it is becoming increasingly difficult to remove all vulnerabilities that can potentially be exploited by intruders. Intrusion tolerance is an emerging approach that aims to enable systems to continue functioning in spite of successful intrusions. Before intrusion tolerance is accepted as an approach to security, there must be ...

Journal: :JNW 2011
Deguang Wang Zhigang Zhou

Intrusion detection is a computer network system that collects information on several key points. and it gets these information from the security audit, monitoring, attack recognition and response aspects, check if there are some the behavior and signs against the network security policy. The classification of data acquisition is a key part of intrusion detection. In this article, we use the da...

2011
Hui Zhao Zhiyi Fang

Current majority voting mechanism usually used in intrusion tolerant system have some limits. To solve this problem, a novel adaptive probability voting mechanism based on double threshold values is proposed. The intrusion tolerance system based on this voting mechanism can provide correct and reliable services continually in case of existing fault or intrusion and detect the faulty server repl...

2009
Yermek Nugmanov Brajendra Panda Yi Hu

This research focuses on analyzing the cost effectiveness of a database intrusion detection system that uses dependencies among data items to detect malicious transactions. The model suggested in this paper considers three main factors: the quality of intrusion detection, the probability of intrusion, and the cost structure of an organization whose data is protected by the intrusion detection s...

Journal: :SoftwareX 2022

Intrusion Response is a relatively new field of research. Recent approaches for the creation Systems (IRSs) use Reinforcement Learning (RL) as primary technique optimal or near-optimal selection proper countermeasure to take in order stop mitigate an ongoing attack. However, most them do not consider fact that systems can change over time or, other words, exhibit non-stationary behaviors. Furth...

2007
Pedro García-Teodoro Jesús E. Díaz-Verdejo Gabriel Maciá-Fernández

This paper presents some proposals and contributions in network-based intrusion-related technologies. Two key points are discussed in this line: anomaly-based intrusion detection, and active response mechanisms. The first issue is mainly focused on the consideration of a stochastic approach to model the normal behavior of the network system to be monitored and protected. This anomaly-based dete...

1998
Phillip A. Porras Stuart Staniford-Chen Brian Tung

As intrusions and other attacks become more widespread and more sophisticated, it becomes beyond the scope of any one intrusion detection and response (ID&R) system to deal with them. The need thus arises for systems to cooperate with one another, to manage diverse attacks across networks and time. Heretofore, eeorts toward \cooperation" have focused primarily on homogeneous components, with li...

Journal: :journal of advances in computer research 2014
behnaz hadi alireza khosravi abolfazl ranjbar n. pouria sarhadi

in this paper, a robust integral of the sign error (rise) feedback controller is designed for a rigid-link electrically driven (rled) robot manipulator actuated by direct current dc motor in presence of parametric uncertainties and additive disturbances. rise feedback with implicitly learning capability is a continuous control method based on the lyapunov stability analysis to compensate an add...

Journal: :journal of advances in computer research 2014
bahareh gholipour goodarzi hamid jazayeri soheil fateri

in recent years, the needs of the internet are felt in lives of all people.  accordingly, many studies have been done on security in virtual environment. old technics such as firewalls, authentication and encryption could not provide internet security completely; so, intrusion detection system is created as a new solution and a defense wall in cyber environment. many studies were performed on d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید