نتایج جستجو برای: intrusion detection system

تعداد نتایج: 2688299  

2012
K. Vidya

–Nowadays, as information systems are more open to the Internet, the importance of secure networks is tremendously increased. New intelligent Intrusion Detection Systems (IDSs) which are based on sophisticated algorithms rather than current signature-base detections are in demand. There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgrad...

2012
M. Moorthy S. Sathiyabama Neveen I. Ghali Lakhwinder Kaur Savita Gupta Shu Yun Lim Qinglei Zhang Wenying Feng Manas Ranjan Patra

The exponential growth in wireless network faults, vulnerabilities, and attacks make the WLAN security management a challenging research area [29]. Data mining applied to intrusion detection is an active area of research. The main reason for using data mining techniques for intrusion detection systems is due to the enormous volume of existing and newly appearing network data that require proces...

2014
Shahul Kshirsagar S. R. Yadav

To improve network security different steps has been taken as size and importance of the network has increases day by day. Then chances of a network attacks increases Network is mainly attacked by some intrusions that are identified by network intrusion detection system. These intrusions are mainly present in data packets and each packet has to scan for its detection. This paper works to develo...

2009
IFTIKHAR AHMAD AZWEEN B ABDULLAH ABDULLAH S. ALGHAMDI

Intrusion detection systems are the foremost tools for providing safety in computer and network system. There are many limitations in traditional IDSs like time consuming statistical analysis, regular updating, non adaptive, accuracy and flexibility. It is an Artificial Neural Network that supports an ideal specification of an Intrusion Detection System and is a solution to the problems of trad...

2007
Lei WEI

This paper proposes a group of criteria for evaluating Intrusion Detection Systems (IDS for short). In this article, an existing evaluation strategy of intrusion detection system is going to be briefly introduced as a case to be assessed against our proposed criteria. Intrusion Detection Systems are critical components to the primary defence of computer system and network security. An evaluatio...

Journal: :IJIIT 2015
Anand Kannan Karthik Gururajan Venkatesan Alexandra Stagkopoulou Sheng Li Sathyavakeeswaran Krishnan Arifur Rahman

This paper proposes a new cloud intrusion detection system for detecting the intruders in a traditional hybrid virtualized, cloud environment. The paper introduces an effective feature selection algorithm called Temporal Constraint based on Feature Selection algorithm and also proposes a classification algorithm called hybrid decision tree. This hybrid decision tree has been developed by extend...

2004
John Reuning

This paper explores the application of probabilistic information retrieval theories to the field of log analysis and host-based intrusion detection. Strong similarities exist between intrusion detection and information retrieval. Using information retrieval techniques may yield significant improvements to the performance of intrusion detection systems. This paper provides a brief review of curr...

2005
Richard A. Wasniowski

In this paper we propose a framework for multisensor intrusion detection called Fuzzy Agent-Based Intrusion Detection System. A unique feature of this model is that the agent uses data from multiple sensors and the fuzzy logic to process log files. Use of this feature reduces the overhead in a distributed intrusion detection system. We have developed an agent communication architecture that pro...

1999
Stefan Axelsson

Research in automated computer security intrusion detection, intrusion detection for short, is maturing. Several difficulties remain to be solved before intrusion detection systems become commonplace as part of real-world security solutions. One such difficulty regards the subject of effectiveness, how successful the intrusion detection system is at actually detecting intrusions with a high deg...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید