نتایج جستجو برای: intrusion detection systems idss

تعداد نتایج: 1697787  

2012
K. Vidya

–Nowadays, as information systems are more open to the Internet, the importance of secure networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) which are based on sophisticated algorithms rather than current signature-base detections are in demand. There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgrad...

Journal: :IEEE Transactions on Network and Service Management 2022

In 2016, Google introduced the concept of Federated Learning (FL), enabling collaborative Machine (ML). FL does not share local data but ML models, offering applications in diverse domains. This paper focuses on application to Intrusion Detection Systems (IDSs). There, common criteria compare existing solutions are missing. particular, this survey shows: (i) how FL-based IDSs used different dom...

2009
Tyrone Grandison Evimaria Terzi

Intrusion Detection (ID) is the process of monitoring events occurring in a system and signalling responsible parties when interesting (suspicious) activity occurs. Intrusion Detection Systems (IDSs) consist of 1) an agent that collects the information on the stream of monitored events, 2) an analysis engine that detects signs of intrusion, and 3) a response module that generates responses base...

Journal: :Int. Journal of Network Management 2007
Paulo Fernando da Silva Carlos Becker Westphall

In Ref. [2] some reasons that justify the necessity of a definition of a standard architecture and communication for the intrusion detection systems are described. Some of these reasons are the even increasing amount of intrusion detection systems available in the market, and the fact that intrusions usually involve nets of various companies or various nets of the same company. These nets will ...

2017
Radhakrishna Naik Vivek Kshirsagar B S Sonawane W. Lee R. A. Nimbalkar K. K. Yee S. B. Patil P. H. Desai T. T. Tran S. J. Stolfo A. H. Sung

Nowadays, as information systems are more open to the Internet, the importance of secure networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) which are based on sophisticated algorithms rather than current signature-base detections are in demand. In this paper, we propose a new data-mining based technique for intrusion detection using an ensemble of binary clas...

2003
Srinivas Mukkamala Andrew H. Sung Ajith Abraham

Soft computing techniques are increasingly being used for problem solving. This paper addresses using ensemble approach of different soft computing techniques for intrusion detection. Due to increasing incidents of cyber attacks, building effective intrusion detection systems (IDSs) are essential for protecting information systems security, and yet it remains an elusive goal and a great challen...

2004
Ja-Min Koo Sung-Bae Cho

As the computer environment changes significantly, several mechanisms such as firewall are developed and intrusion detection system (IDS) is the representative among them. However, because many IDSs are modeled and evaluated with known intrusion patterns, they have inertia not to detect the intrusions which are unknown or transformed. In this paper, we propose an IGA-based method to generate th...

2011
Silvia González Javier Sedano Álvaro Herrero Bruno Baruque Emilio Corchado

In last decades there have been many proposals from the machine learning community in the intrusion detection field. One of the main problems that Intrusion Detection Systems (IDSs) mainly anomaly-based ones have to face are those attacks not previously seen (zero-day attacks). This paper proposes a mutation technique to test and evaluate the performance of several classifier ensembles incorpor...

Journal: :Computers & Electrical Engineering 2009
M. Ali Aydin A. Halim Zaim K. Gökhan Ceylan

Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs collect network traffic information from some point on the network or computer system and then use this information to secure the network. Intrusion detection systems can be misuse-detection or anomaly detection based. Misuse-detection based IDSs can only detect known a...

2003
Jacob W. Ulvila John E. Gaffney

This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric. Results are given for the operation of a single IDS and for a combination...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید