نتایج جستجو برای: intrusion response system
تعداد نتایج: 3050974 فیلتر نتایج به سال:
Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be accidental. Instead some failures may be caused by deliberate security intrusions with the intent ranging from simple mischief, theft of confidential information to loss of crucial and possibly life saving services. Not only it is important to prevent and/or tolerate securit...
Intrusion detection systems (IDS) strive to catch computer system intrusion & utilize by any garnering and analyzing data. Wireless IDSs garner all local wireless transmissions and generate alerts based either on predefined signatures or on anomalies in the traffic. These wireless IDS can monitor and analyze user and system activities of known attacks, identity abnormal network activity and det...
This paper describes the implementation of a distributed agent architecture for intrusion detection and response in networked computers. Unlike conventional intrusion detection systems (IDS), this security system attempts to emulate mechanisms of the natural immune system using Java-based mobile software agents. These security agents monitor multiple levels (packet, process, system, and user) o...
Security has become the Achilles’ heel of many organizations in today’s computer-dominated society. In this paper, a configurable intrusion detection and response framework named Mobile Agents based Distributed (MAD) security system was proposed for enterprise network consisting of a large number of mobile and handheld devices. The key idea of MAD is to use autonomous mobile agents as lightweig...
Identifying intrusions is the process called intrusion detection. In simple manner the act of comprising a system is called intrusion. An intrusion detection system (IDS) inspects all inbound and outbound activity and identifies suspicious patterns that may indicate a system attack from someone attempting to compromise a system. If we think of the current scenario then several new intrusion tha...
An improved algorithm named "twice-FFT" for multi-point intrusion location in distributed Sagnac sensing system is proposed and demonstrated. To find the null-frequencies more accurately and efficiently, a second FFT is applied to the frequency spectrum of the phase signal caused by intrusion. After Gaussian fitting and searching the peak response frequency in the twice-FFT curve, the intrusion...
A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید