نتایج جستجو برای: host based intrusion detection

تعداد نتایج: 3501797  

2014
Nithya Karthika

Mobile Ad hoc Network is a collection of mobile nodes equipped with both a wireless transmitter and a receiver that communicate with each other via bidirectional wireless links either directly or indirectly. The self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of...

2004
Stefano Zanero

The continuous evolution of the types of attacks against computer networks suggests a paradigmatic shift from misuse based intrusion detection system to anomaly based systems. Unsupervised learning algorithms are natural candidates for this task, but while they have been successfully applied in host-based intrusion detection, network-based applications are more difficult, for a variety of reaso...

Journal: :CoRR 2009
Dewan Md. Farid Mohammad Zahidur Rahman

In this paper, we introduce new learning algorithms for reducing false positives in intrusion detection. It is based on decision tree-based attribute weighting with adaptive naïve Bayesian tree, which not only reduce the false positives (FP) at acceptable level, but also scale up the detection rates (DR) for different types of network intrusions. Due to the tremendous growth of network-based se...

2004
Salvador Mandujano Arturo Galván

This paper describes a variation to the traditional intrusion detection approach motivated by longstanding challenges and recent trends in information security. Intrusion detection systems have historically focused on the protection of local resources by identifying signs of malicious activity that may help administrators prevent a break-in and limit its effects. Outbound intrusion detection fo...

Journal: :journal of advances in computer research 0
hassan asgharian computer engineering, iran university of science and technology, tehran, iran ahmad akbari computer engineering, iran university of science and technology, tehran, iran bijan raahemi school of electrical engineering and computer science, university of ottawa, ottawa, canada

session initiation protocol (sip) is the main signaling protocol of next generation networks (ngn). sip based applications are usually deployed over the internet, for which their text-based nature and internal stateful operation make them vulnerable to different types of attacks. the real‑time functionality of sip based applications make their related security systems more complex. on the other...

2014
Partha Ghosh Ria Ghosh Ruma Dutta

The massive jumps in technology led to the expansion of Cloud Computing as the most accepted medium for communication but it has also increased the scope of attacks as well. So security has become a major issue for Cloud Computing. In this paper we proposed a single IDS Controller creating and managing multiple instances for each user. A multithreaded NIDS protects the cloud efficiently and avo...

2015

Intrusion System. IDS have the task of monitoring the systems in a network and detect the Intrusion detection system is classified into two types: 1. Host based. IDS is a passive system meant to keep track of a system's traffic and log it for further reporting. By its nature, IDS is looking for a "green light" in the traffic flow. Compare and contrast signature-based and anomaly-based intrusion...

2015
Tarek Helmy

The system that monitors the events occurring in a computer system or a network and analyzes the events for sign of intrusions is known as intrusion detection system. The performance of the intrusion detection system can be improved by combing anomaly and misuse analysis. This chapter proposes an ensemble multi-agent-based intrusion detection model. The proposed model combines anomaly, misuse, ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی صنعتی کرمان - پژوهشکده برق و کامپیوتر 1390

در سال های اخیر پیشرفت مربوط به فناوری اطلاعات، باعث تحول صنعت بانکداری در حوز? بانکداری الکترونیکی شده است. خصوصاً پیشرفت در فناوری بی سیم، و ارائ? بانکداری سیار، انعطاف پذیری زمانی و مکانی در استفاده از خدمات بانکداری را برای مشتریان فراهم آورده است. نگرانی های امنیتی مسأله ای است که توجه بسیاری را چه از فراهم کنندگان سرویس و چه کاربران را در حوز? بانکداری به خود معطوف کرده است. وجود یک دیوار ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید