نتایج جستجو برای: intrusion response system

تعداد نتایج: 3050974  

Journal: :Perform. Eval. 2004
Bharat B. Madan Katerina Goseva-Popstojanova Kalyanaraman Vaidyanathan Kishor S. Trivedi

Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be accidental. Instead some failures may be caused by deliberate security intrusions with the intent ranging from simple mischief, theft of confidential information to loss of crucial and possibly life saving services. Not only it is important to prevent and/or tolerate securit...

2013
Prakash Kumar Pradeep Kumar

Intrusion detection systems (IDS) strive to catch computer system intrusion & utilize by any garnering and analyzing data. Wireless IDSs garner all local wireless transmissions and generate alerts based either on predefined signatures or on anomalies in the traffic. These wireless IDS can monitor and analyze user and system activities of known attacks, identity abnormal network activity and det...

2001
Dipankar Dasgupta

This paper describes the implementation of a distributed agent architecture for intrusion detection and response in networked computers. Unlike conventional intrusion detection systems (IDS), this security system attempts to emulate mechanisms of the natural immune system using Java-based mobile software agents. These security agents monitor multiple levels (packet, process, system, and user) o...

Journal: :IJHCR 2011
Yu Cai

Security has become the Achilles’ heel of many organizations in today’s computer-dominated society. In this paper, a configurable intrusion detection and response framework named Mobile Agents based Distributed (MAD) security system was proposed for enterprise network consisting of a large number of mobile and handheld devices. The key idea of MAD is to use autonomous mobile agents as lightweig...

Journal: :Asian Journal of Information Technology 2011

2013
Chetan Gupta Amit Sinhal Rachana Kamble

Identifying intrusions is the process called intrusion detection. In simple manner the act of comprising a system is called intrusion. An intrusion detection system (IDS) inspects all inbound and outbound activity and identifies suspicious patterns that may indicate a system attack from someone attempting to compromise a system. If we think of the current scenario then several new intrusion tha...

Journal: :Optics express 2014
He Wang Qizhen Sun Xiaolei Li Jianghai Wo Perry Ping Shum Deming Liu

An improved algorithm named "twice-FFT" for multi-point intrusion location in distributed Sagnac sensing system is proposed and demonstrated. To find the null-frequencies more accurately and efficiently, a second FFT is applied to the frequency spectrum of the phase signal caused by intrusion. After Gaussian fitting and searching the peak response frequency in the twice-FFT curve, the intrusion...

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

Journal: :International Journal of Computer Applications 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید