نتایج جستجو برای: intrusion response system

تعداد نتایج: 3050974  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1389

fluorescence chemical sensors for the highly sensitive and selective determination of pb2+ , hg2+, co2+ and fe3+ ions in aqueous solutions are described. the ion sensing system was prepared by incorporating lipophilic ligand (l) as a neutral ion-selective fluoroionophore in the plasticized pvc membrane containing sodium tetraphenylborate or potasium tetrakis (p-chlorophenyl) borate as a liphoph...

2007
AIKATERINI MITROKOTSA NIKOS KOMNINOS CHRISTOS DOULIGERIS

Ad hoc networks have received great attention in recent years, mainly due to their important advantages and their growing demand. Nevertheless, ad hoc networks present many inherent vulnerabilities and demand efficient security mechanisms in order to be safeguarded. An efficient intrusion detection approach combined with an authenticated intrusion response can act as an effective line of defens...

Journal: :Global Journal of Engineering and Technology Advances 2023

Intrusion detection system (IDS) is the process of monitoring events occurring in a computer or network and analyzing them for signs possible incidents, which are violations imminent threats violation security policies. An intrusion prevention (IPS) software that has all capabilities an can also attempt to stop incidents. If anomaly traffic pass through IDS would generate false positive means i...

2005
Aleksandar Lazarevic Vipin Kumar Jaideep Srivastava

This chapter provides the overview of the state of the art in intrusion detection research. Intrusion detection systems are software and/or hardware components that monitor computer systems and analyze events occurring in them for signs of intrusions. Due to widespread diversity and complexity of computer infrastructures, it is difficult to provide a completely secure computer system. Therefore...

2017
Jie Yan Manimaran Govindarasu Chen-Ching Liu Ming Ni Umesh Vaidya Jie YAN Manimaran GOVINDARASU Chen-Ching LIU Ming NI Umesh VAIDYA

Cyber threats are serious concerns for power systems. For example, hackers may attack power control systems via interconnected enterprise networks. This paper proposes a risk assessment framework to enhance the resilience of power systems against cyber attacks. The duality element relative fuzzy evaluation method is employed to evaluate identified security vulnerabilities within cyber systems o...

Journal: :JNW 2013
Lei Ding Fei Yu Zhenghua Yang Guangxue Yue

To improve the measuring accuracy of intrusion detection, a system design of a node for intrusion detection is proposed in this paper. First, the technology that applies the traditional intrusion detection method, such as anomaly detection and misuse detection, into P2P networks is presented. Next, to build the trust relationship among the nodes, and realize the cooperation mechanism of data de...

2003
Xuan Dau Hoang Jiankun Hu Peter Bertók

In this paper we present a new method to process sequences of system calls for anomaly intrusion detection. The key idea is to build a multi-layer model of program behaviours based on both hidden Markov models and enumerating methods for anomaly intrusion detection, which differs from the conventional single layer approach. Our experiments on Unix sendmail program have shown that the model is b...

2001
Xinyuan Wang Douglas S. Reeves S. Felix Wu

Network-based intrusion has become a serious threat to today’s highly networked information systems, existing intrusion defense approaches such as intrusion prevention, detection, tolerance and response are “passive” in response to network-based intrusions in that their countermeasures are limited to being local to the intrusion target and there is no automated, network-wide counteraction again...

Journal: :CoRR 2009
Mohammad Saiful Islam Mamun A. F. M. Sultanul Kabir Md. Sakhawat Hossen Razib Hayat Khan

In recent years, wireless sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system (IDS) needs to be introduced. In this paper we prop...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید