نتایج جستجو برای: network intrusion detection

تعداد نتایج: 1198390  

Journal: :JNW 2013
Wen-Tie Wu Min Li Bo Liu

In order to overcome the separately selection advantages of traditional feature and RBF neural network parameter, increase accuracy rate of network’s intrusion detection, there came up with a research on neural network intrusion detection of improved particle swarm optimization. According to optimize the feature selection of network and RBF neural network parameter, established a neural network...

Journal: :journal of advances in computer research 0
hassan asgharian computer engineering, iran university of science and technology, tehran, iran ahmad akbari computer engineering, iran university of science and technology, tehran, iran bijan raahemi school of electrical engineering and computer science, university of ottawa, ottawa, canada

session initiation protocol (sip) is the main signaling protocol of next generation networks (ngn). sip based applications are usually deployed over the internet, for which their text-based nature and internal stateful operation make them vulnerable to different types of attacks. the real‑time functionality of sip based applications make their related security systems more complex. on the other...

2004
V. Chatzigiannakis G. Androulidakis M. Grammatikou B. Maglaris

Intrusion Detection is the problem of identifying unauthorized use, misuse, and abuse of computer systems by both system insiders and external intruders. Intrusion Detection Systems provide in depth packet analysis and application awareness and can be deployed for discovering network attacks. In this scenario a system that gives intelligence about the traffic on your network is necessary. This ...

2014
Alka Chaudhary V. N. Tiwari Anil Kumar

Computer networks are more vulnerable to insider and outsider attacks in recent days due to its widespread use in each field. For that aspect, numbers of security mechanism have been applied to minimize the effect of possible attacks in the network. One of very appealing concept towards network security is intrusion detection system that can able to identify the difference between normal and ab...

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

2007
A. Maciej Rossudowski Hein S. Venter Jan H. P. Eloff

Intrusion Detection Systems play an invaluable role within organisations by detecting attempted attacks on their IT systems. However, Intrusion Detection Systems are complex to set-up and require large quantities of memory and processing power to effectively analyse the large volumes of network traffic involved. Behavioural analysis plays an important role within Intrusion Detection Systems by ...

2009
IFTIKHAR AHMAD AZWEEN B ABDULLAH ABDULLAH S. ALGHAMDI

Intrusion detection systems are the foremost tools for providing safety in computer and network system. There are many limitations in traditional IDSs like time consuming statistical analysis, regular updating, non adaptive, accuracy and flexibility. It is an Artificial Neural Network that supports an ideal specification of an Intrusion Detection System and is a solution to the problems of trad...

2016
Tichun Wang Hongyang Zhang Lei Tian Haifeng Hu Weina He

In recent years, with the rapid development of information and network technology, computer and network infrastructure has become a popular target of hacker attacks. The intense demand for electronic commerce has intensified the growth of hacking incidents. Network security is a systematic concept, and the effective security policy or scheme is the primary goal of network information security. ...

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

2000
Chenxi Wang John C. Knight

An intruder may target the ID scheme first in order to facilitate further malicious activities. For an intrusion-detection system that is operating in real time, an intruder could be exposed if they were simply to disable the IDS, a denial-of-service attack. A corrupted intrusion-detection system, however, might report erroneous information or fail to identify an attack. The consequences could ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید