نتایج جستجو برای: intrusion detection system ids

تعداد نتایج: 2690345  

2013
Amit Bhardwaj Parneet Kaur

Assuring secure and reliable operation of networks has become a priority research area these days because of ever growing dependency on network technology. Intrusion detection systems (IDS) are used as the last line of defense. Intrusion Detection System identifies patterns of known intrusions (misuse detection) or differentiates anomalous network data from normal data (anomaly detection). In t...

2012
Ravi Kishore Sharma Gajendra Singh Chandel

This Paper titled “Novel Approach for Intrusion Detection System” is an intrusion detection system (IDS) proposed by analyzing the principle of the intrusion detection system based on host and network. Basically this paper is to develop host based cum network based intrusion detection system for Microsoft Windows XP environment. Proposed concept that had used in this was applying intrusion dete...

2011
Bhushan Trivedi Jayant Rajput Chintan Dwivedi Pinky Jobanputra

The increasing number of network security related incidents makes it necessary for organizations to actively protect their sensitive data with the installation of intrusion detection systems (IDS). Autonomous software agents, especially when equipped with mobility, promise an interesting design approach for such applications. We evaluate the implications of applying mobile agent technology to t...

2003
Lixin Wang

Since the advent of intrusion detection system (IDS) in the early 1980s, IDS has been suffering many problems until now. The detection of novel attacks and lower rate of false alarms must be realized in successful IDS. Misuse detection compares data against predefined patterns usually collected by an IDS signature database. It is hard for misuse detection to detect even slightly variation of kn...

Journal: :IJDSN 2013
Nabil Ali Alrajeh Shafiullah Khan Bilal Shams

The security of wireless sensor networks is a topic that has been studied extensively in the literature. The intrusion detection system is used to detect various attacks occurring on sensor nodes of Wireless Sensor Networks that are placed in various hostile environments. As many innovative and efficient models have emerged in the last decade in this area, we mainly focus our work on Intrusion ...

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

2013
David C. Wyld

Cyber criminals compromise Integrity, Availability and Confidentiality of network resources in cyber space and cause remote class intrusions such as U2R, R2L, DoS and probe/scan system attacks .To handle these intrusions, Cyber Security uses three audit and monitoring systems namely Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS). Intrusion Detection System (IDS) monitors ...

2012
Joffre Gavinho Filho Luiz F. R. C. Carmo Raphael Machado Luci Pirmez

An Intrusion Detection System (IDS) for Cognitive Radio Network (CRN) is proposed. The considered IDS is constructed by combining two classic mechanisms for CRN intrusion detection, namely the Localization mechanism and the Reputation mechanism. The composition of the mechanisms is done with the aid of a Genetic Algorithm (GA) responsible for calibrating the IDS, that is, for attributing “weigh...

2017
Soumya Tiwari Nitesh Gupta

We secure information either in private or government sector as it has become an essential requirement. System vulnerabilities and valuable information magnetize most attackers’ attention. Traditional approaches that are used for intrusion detection, such as firewalls or encryption are not sufficient to prevent system from all attack types. Subsequently the number of attacks through network and...

2013
Pramod Bide Rajashree Shedge

Cloud computing provides a framework for supporting end users easily attaching powerful services and applications through Internet. Denial ofService (DoS) attack or Distributed Denial-of-Service (DDoS) are major security issues in cloud environment. The best solution to protect the cloud from these attacks is use of IDS. IDS have become popular cloud security technology to detect cyber attacks ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید