نتایج جستجو برای: intrusion

تعداد نتایج: 18427  

2013
Kanika Anand

An Intruder is a hacker or cracker which always tries to get access to secure, system Intrusion occurs when an unauthorized person try to gain access or interrupt the normal operations of an information system. Even when such attacks ar e self-propagating, as in the case o f worms, Trojan Horses and denial-of service attacks, they are almost always initiated by an individual whose purpose is to...

Journal: :IP Indian Journal of Orthodontics and Dentofacial Research 2019

2000
STEFAN AXELSSON Hans Hedbom Stefan Lindskog Stefan Axelsson

With the ever increased use of computers for critical systems, computer security— the protection of data and computer systems from intentional, malicious intervention—is attracting increasing attention. Many methods of defence already exist, of which one is the strong perimeter defence. This thesis is concerned with one such method of defence, the automated computer security intrusion detection...

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

The study subvolcanic intrusion, comprising syenodiorite, monzonite and quartz-monzonite, is cropped out in Talkh-rud valley located in the northeast of Damavand volcano flank. This sub-volcanic intrusion possesses porphyritic texture and consists of plagioclase, alkali feldspars, phelogopite, amphibole, clinopyroxene, apatite and titanomagnetite. Evidences of disequilibrium such as zoning and ...

2014
M. S. Chaudhari

With the rapid growth of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is through monitoring unusual user activity. This can be achieved with an Intrusion Detection System, which identifies attacks and reacts by generating alerts or by blocking the unwanted data/traffic. These systems are mainl...

2009
S. G. Kandlikar M. Daino

Intrusion of the gas diffusion layer (GDL) into gas channels due to fuel cell compression has amajor impact on the gas flow distribution, fuel cell performance and durability. In this work, the effect of compression resulting in GDL intrusion in individual parallel PEMFC channels is investigated. The intrusion is determined using two methods: an optical measurement in both the in-plane and thro...

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

2015
Vimla Jethani

Intrusion Detection Systems (IDSs) detects the network factor for traditional SNORT (Network Based Intrusion. Detection Using Genetic Algorithms for intrusion detection has proven to be an implementation method. Section IV. Designing of On Line Intrusion Detection System Using Rough Set Theory and Q Evaluation of Rough Set Theory Based Network Traffic Data Classifier Using Traffic Data Classifi...

2003
Oleg Kachirski Ratan K. Guha

In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to intrusion, as they operate in open medium, and use cooperative strategies for network communications. By efficiently merging audit data from multiple network sensors, we analyze the entire ad hoc wireless network for in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید