نتایج جستجو برای: intrusion response system

تعداد نتایج: 3050974  

2016
Amrit Pal Singh

Intrusion-detection systems (IDS) aim at detecting attacks against computer systems and networks or, in general, against information systems. Its basic aim is to protect the system against malwares and unauthorized access of a network or a system. Intrusion Detection is of two types Network-IDS and Host BasedIDS. This paper covers the scope of both the types and their result analysis along with...

2014
S. N. Anusha

In this paper we propose a model based analysis to provide QoS Guarantee by using the Intrusion Detection System(IDS) in Heterogeneous wireless sensor networks(HWSN).The key concept of our model based analysis is to provide a multipath routing with redundancy management in which the query response probability is maximized and to increase the lifetime of network. In HWSN a voting based intrusion...

2011
Tarek F. Abdelzaher

The severity and number of intrusions on computer networks are rapidly increasing. Preserving the availability and integrity of networked computing systems in the face of those fast-spreading intrusions requires advances not only in detection algorithms, but also in intrusion tolerance and automated response techniques. Additionally, the rapid size and complexity growth of computer networks, an...

2008
Jintae Oh Byoungkoo Kim Seungyong Yoon Jong-Soo Jang Yong-Hee Jeon Jaecheol Ryou

Many Network Intrusion Detection System(NIDS)s have been developed to detect and respond against several kinds of intrusion activities in widespread networks. Due to the explosive growth of network bandwidth, software approach in developing a high-speed NIDS is becoming impractical due to the performance constraint. Accordingly, it seems unavoidable to investigate the hardware-based solutions. ...

2015
Xia Wang Johnny S. Wong Ying Cai Wensheng Zhang Yong Guan Thomas E. Daniels

Wireless mesh networking has emerged as a key technology to provide wide-coverage broadband networking. It benefits both service providers with low cost in network deployment, and end users with ubiquitous access to the Internet from anywhere at anytime. Wireless mesh networks are vulnerable to malicious attacks due to the nature of wireless communication and the lack of centralized network inf...

Journal: :CoRR 2007
Aikaterini Mitrokotsa Nikos Komninos Christos Douligeris

In this paper, we present an effective intrusion response engine combined with intrusion detection in ad hoc networks. The intrusion response engine is composed of a secure communication module, a local and a global response module. Its function is based on an innovative tree-based key agreement protocol while the intrusion detection engine is based on a class of neural networks called eSOM. Th...

Journal: :American Journal of Engineering and Applied Sciences 2009

2005
Baik Hoh Marco Gruteser

The emerging malware that can spread through local wireless networks among mobile devices has so far received less attention than computer worms in the Internet. The local wireless links provide an alternative propagation path that circumvents intrusion detection at the service provider gateways. On the mobile nodes, conventional intrusion detection and intrusion response techniques such as add...

Journal: :CIT 2007
Adesina Simon Sodiya Aderonke Ikuomola Olusola J. Adeniran

A Site Security Officer (SSO) who is a network security staff that responds to alarms from an Intrusion Detection System (IDS), is always faced with the critical problem of low response time when the network becomes big. Even a skilled SSO is hard-pressed and less productive when collecting and analyzing IDS output manually as the frequency of intrusion increases. In this work, an Expert System...

2010
Martí Navarro Álvaro Herrero Emilio Corchado Vicente Julián

This paper presents an extension of MOVICAB-IDS, a Hybrid Intelligent Intrusion Detection System characterized by incorporating temporal control to enable real-time processing and response. The original formulation of MOVICAB-IDS combines artificial neural networks and case-based reasoning within a multiagent system to perform Intrusion Detection in dynamic computer networks. The contribution o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید