نتایج جستجو برای: network intrusion detection

تعداد نتایج: 1198390  

2010
Muna Mhammad T. Jawhar Monica Mehrotra

As networks grow both in importance and size, there is an increasing need for effective security monitors such as Network Intrusion Detection System to prevent such illicit accesses. Intrusion Detection Systems technology is an effective approach in dealing with the problems of network security. In this paper, we present an intrusion detection model based on hybrid fuzzy logic and neural networ...

2012
Vijaya Lakshmi

Intrusion detection involves a lot of tools that are used to identify different types of attacks against computer systems and networks. With the development of network technologies and applications network attacks are greatly increasing both in number and severe. Open source and commercial network intrusion detection tools are not able to predict new type of attacks based on the previous attack...

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

2012
Xiaoqiang WANG

Abstract This paper studies on methods taken in solving the existing network disorders in network intrusion detection. Traditional parameter-optimized Support Vector Machine (SVM) may easily generate improper parameter-selections, and may further lead to a low accuracy in network intrusion detection. In order to overcome such problems, so well as to ensure the network security, this paper tries...

2014
Manoj Sharma Keshav Jindal

The numbers of networking attacks are increased from last few years; so there is a need of software and hardware tools to control unauthorized access of a network (intrusion detection) .Firewalls do not provide full protection assurance, so they are complemented by an intrusion detection system. The role of intrusion detection is to enable the computer system to deal with networking attacks . M...

Information security and Intrusion Detection System (IDS) plays a critical role in the Internet. IDS is an essential tool for detecting different kinds of attacks in a network and maintaining data integrity, confidentiality and system availability against possible threats. In this paper, a hybrid approach towards achieving high performance is proposed. In fact, the important goal of this paper ...

2012
Manish Gupta Govind Sharma

Intrusion detection in wireless sensor network is defined as a mechanism to detect the intruder that affects the whole network. These networks (WSN) are susceptible to many kinds of attacks because of their limited capacity such as memory, battery life, and their computational power. In this paper, we reviews many intrusion detection approaches and their limitations that helps to make more effi...

2014
Liang Lei

As computer networks and distributed applications more complex, diverse and intelligent, network behavior anomaly detection has gradually become the effective monitoring and system controlling technology. The paper established a network intrusion detection system and to investigate the data rules, sensors and abnormal behavior automatic identification in this system, a kind of algorithm based o...

2014
Kamini Nalavade B. B. Meshram

With the growth of hacking and exploiting tools and invention of new ways of intrusion, intrusion detection and prevention is becoming the major challenge in the world of network security. The increasing network traffic and data on Internet is making this task more demanding. There are various approaches being utilized in intrusion detections, but unfortunately any of the systems so far is not ...

2012
Sanjay Kumar Sharma Pankaj Pandey M. S. Sisodia

As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the network. Due to large volumes of security audit data as well as complex and dynamic properties of intrusion behaviors, optimizing performance of IDS becomes an important open problem that is receiving more and more attenti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید