نتایج جستجو برای: intrusion

تعداد نتایج: 18427  

2004
Sandhya Peddabachigari Ajith Abraham

Security of computers and the networks that connect them is increasingly becoming of great significance. Intrusion detection is a mechanism of providing security to computer networks. Although there are some existing mechanisms for Intrusion detection, there is need to improve the performance. Data mining techniques are a new approach for Intrusion detection. In this paper we investigate and ev...

2010
Liberios VOKOROKOS Anton BALÁŽ Branislav MADOŠ

In this paper we discuss our research in developing intrusion detection software framework for modeling, simulation and detection computer system intrusion based on partially ordered events and patterns FEIIDS. The article describes problematic of intrusion detection systems and intrusions detection. We provide concrete design of developed framework based on intrusion signatures threats are mat...

2012
Navita Sharma Gurpreet Singh

The immense advancement in attacks against network give rise to interest in more contentious forms of defense to supplement the existing security approaches. Honeypots are physical or virtual machines successfully used as Intrusion detection tool to detect threats. In this paper we proposed a shadow honeypot based intrusion detection system. Shadow honeypot is used to collect the intrusion from...

2013
Qinglei Zhou Yilin Zhao

Intrusion detection technology is a research hotspot in the field of information security. This study introduces the types of traditional intrusion detection and data mining technology; Aiming at the defects and limitations of current intrusion detection system, the study has fused the data mining technology into intrusion detection model, and has designed and implemented the intrusion detectio...

2008
Liberios VOKOROKOS Anton BALÁŽ Norbert ÁDÁM

The goal of this paper is to present designed architecture of intrusion detection system based on events planning and intrusion signature. The article describes problematic of the variation of intrusions and intrusion detection systems. The core of the proposed architecture is intrusion signature matching through petri nets that clasify system behaviour and determine potential intrusion of moni...

Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training,  ...

Journal: :CoRR 2012
Rajdeep Borgohain

-------------------------------------------------------------------ABSTRACT-----------------------------------------------------------------With the increase in the number of security threats, Intrusion Detection Systems have evolved as a significant countermeasure against these threats. And as such, the topic of Intrusion Detection Systems has become one of the most prominent research topics i...

2003
Mikhail Gordeev

Intrusion detection plays one of the key roles in computer system security techniques. This paper is dedicated to this topic. It describes major approaches to intrusion detection and focuses on methods used by intrusion detection systems. We do not describe in this paper details of existing intrusion detection system. Instead, we concentrate on underlying principles and methods. This paper can ...

2015
Francisco Bolivar

As part of the Siemens Building Technologies Division, the business segment and intrusion detection products and systems plus video surveillance products. Siemens Energy provides its customers with the latest tecnology in Intrusion Detection Systems (IDS) Siemens Corporate Research Modern intrusion detection systems (IDSes) for virtualized environments are 2.1 VMM-Based Intrusion Detection Syst...

Journal: :journal of advances in computer research 2013
s.mobarakeh moosavirad peyman kabiri hamidreza mahini

intrusion detection in wireless networks has been a challenging researchproblem in network security for more than half a century. this paper presents anovel intrusion detection method based on received signal strength acceptancetest (rssat) to improve the ids capabilities in anomaly-based host-basedintrusion detection systems (hids). the new system can identify suspiciousbehaviors detecting ano...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید