نتایج جستجو برای: intrusion detection systems ids
تعداد نتایج: 1700198 فیلتر نتایج به سال:
Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...
To appropriately address the problem of large-scale distributed intrusion assessment/detection, issues such as information exchange, work division and coordination amongst various Intrusion Detection Systems (IDS) must be addressed. An approach based on autonomous local IDS agents performing event processing coupled with cooperative global problem resolution is preferred. However, it is not cle...
In this document we introduce a novel framework for behaviour based Network Intrusion Detection Systems (NIDS). Its main goal is the application of theoretical immunological concepts to provide adaptability to the normality of the network behaviour, based on memory and learning from previous attacks. We present some important principles and concepts relevant to the description and categorizatio...
In this paper, we survey different intrusions affecting availability, confidentiality and integrity of Cloud resources and services. Proposals incorporating Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) in Cloud are examined. We recommend IDS/IPS positioning in Cloud environment to achieve desired security in the next generation networks. & 2012 Elsevier Ltd. All righ...
The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throug...
Intrusion Detection Systems (IDS) are among the fastest growing technologies in computer security domain. These systems are designed to identify/ prevent any hostile intrusion into a network. Today, variety of open source and commercial IDS are available to match the users/ network requirements. It has been accepted that the open source intrusion detection systems enjoys more support over comme...
Prevention of security breaches completely using the existing security technologies is unrealistic. As a result, intrusion detection is an important component in network security. However, many current intrusion detection systems (IDSs) are signature-based systems, The signature based IDS also known as misuse detection looks for a specific signature to match, signalling an intrusion. Provided w...
internet applications spreading and its high usage popularity result insignificant increasing of cyber-attacks. consequently, network security has becomea matter of importance and several methods have been developed for these attacks.for this purpose, intrusion detection systems (ids) are being used to monitor theattacks occurred on computer networks. data mining techniques, machinelearning, ne...
Intrusion-detection systems (IDS) aim at detecting attacks against computer systems and networks or, in general, against information systems. Its basic aim is to protect the system against malwares and unauthorized access of a network or a system. Intrusion Detection is of two types Network-IDS and Host BasedIDS. This paper covers the scope of both the types and their result analysis along with...
An Intruder is a hacker or cracker which always tries to get access to secure, system Intrusion occurs when an unauthorized person try to gain access or interrupt the normal operations of an information system. Even when such attacks ar e self-propagating, as in the case o f worms, Trojan Horses and denial-of service attacks, they are almost always initiated by an individual whose purpose is to...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید