نتایج جستجو برای: intrusion response system

تعداد نتایج: 3050974  

Journal: :journal of advances in computer research 2013
zeinab kermansaravi hamid jazayeriy soheil fateri

internet applications spreading and its high usage popularity result insignificant increasing of cyber-attacks. consequently, network security has becomea matter of importance and several methods have been developed for these attacks.for this purpose, intrusion detection systems (ids) are being used to monitor theattacks occurred on computer networks. data mining techniques, machinelearning, ne...

2008
Joseph Barrus Neil C. Rowe

We propose a distributed architecture with autonomous agents to monitor security-related activity within a network. Each agent operates cooperatively yet independently of the others, providing for efficiency, real-time response and distribution of resources. This architecture provides significant advantages in scalability, flexibility, extensibility, fault tolerance, and resistance to compromis...

2009
HAN-PANG HUANG FENG-CHENG YANG MING-TZONG WANG CHIA-MING CHANG Tsan-sheng Hsu

The network security is getting more important due to the wide-spread computer viruses and increasing network attacks. Nowadays, more and more security mechanisms, such as firewalls and intrusion detection systems (IDS), are introduced to protect the network from malicious attacks. This paper proposes an agent and service based intrusion detection and response system for active network. In cont...

Journal: :International Journal of Computer Applications 2017

2009
Tyrone Grandison Evimaria Terzi

Intrusion Detection (ID) is the process of monitoring events occurring in a system and signalling responsible parties when interesting (suspicious) activity occurs. Intrusion Detection Systems (IDSs) consist of 1) an agent that collects the information on the stream of monitored events, 2) an analysis engine that detects signs of intrusion, and 3) a response module that generates responses base...

2005
Jens Lichtenberg Jorge Marx Gómez

One of the main problems in eCommerce applications and all other systems handling confidential information in general, is the matter of security. This paper introduces the idea of an intrusion detection management system to support the security. Intrusion detection per se, is the act of detecting an unauthorized intrusion by a computer or a network from the inside or the outside of the affected...

Journal: :International Journal of Engineering and Techniques 2020

Abbas Ghaemi Bafghi Amin Rasoulifard

In this paper, a boosting-based incremental hybrid intrusion detection system is introduced. This system combines incremental misuse detection and incremental anomaly detection. We use boosting ensemble of weak classifiers to implement misuse intrusion detection system. It can identify new classes types of intrusions that do not exist in the training dataset for incremental misuse detection. As...

2001
STANISLAV MILANOVIC ZORAN PETROVIC

This paper explores an Internet-based VPN solution, built upon IPSec, which combines tunneling with PKI authentication and encryption. To protect the valuable company resources, an efficient intrusion/misuse detection and response system was incorporated into deployed security solution. This approach enabled a large-scale customer provide their global e-business safely. As a result, an integrat...

Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training,  ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید