نتایج جستجو برای: intrusion detection system ids

تعداد نتایج: 2690345  

2005
Ajith Abraham

Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. An intrusion is defined as any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known...

2009
Lior Rokach Yuval Elovici

Intrusion detection is the process of monitoring and analyzing the events occurring in a computer system in order to detect signs of security problems. The problem of intrusion detection can be solved using anomaly detection techniques. For instance, one is given a set of connection data belonging to different classes (normal activity, different attacks) and the aim is to construct a classifier...

2017
Anu Devi Sandeep Garg

1RESEARCH SCHOOLAR 2ASSISTANT PROFESSOR Dept. of Computer Science and Engineering RPIIT Karnal Haryana, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract Due increased growth of Internet; number of network attacks has been increased. Which emphasis needs for intrusion detection systems (IDS)...

2015
Md Tarik Amandeep Singh

The goal of a this IDS is to identify malicious behaviour that targets a network or a host and its resources. Intrusion detection parameters are numerous and in many cases they present uncertain and imprecise causal relationships which can affect attack types. A Bayesian Network here used is a graphical modeling tool which used to model decision problems containing uncertainty. BN and K2 learni...

Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...

2014
Anurag Jain Bhupendra Verma J. L. Rana

In a broader sense detection of any unauthorized access of any information system is the basic aim of any intrusion detection system. However due to cost considerations it is practically impossible to provide total protection to an information system from intrusion for its entire useful life time. In this paper we provide a brief introduction to anomaly based intrusion detection systems that cl...

2011
Manish Kumar

The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throug...

2013
Qingtao Wu Xulong Zhang Ruijuan Zheng Mingchuan Zhang

We present an innovative intrusion detection model based on autonomic computing to extend the passive detection mechanism in a traditional intrusion detection system (IDS). Centered on an autonomic manager, this model introduces a multi-attribute auction mechanism in the agent coordination layer to perceive environmental changes, manage and allocate resources, and achieve an active response to ...

2012
K.KEERTHI P.SREENIVAS

IDS (Intrusion Detection system) is an active and driving defense technology. This project mainly focuses on intrusion detection based on data mining. Data mining is to identify valid, novel, potentially useful, and ultimately understandable patterns in massive data. This project presents an approach to detect intrusion based on data mining frame work. Intrusion Detection System (IDS) is a popu...

Journal: :Computer and Information Science 2010
Olusegun Folorunso Oluwatobi O. Akande Adewale Opeoluwa Ogunde Olufunke R. Vincent

The study examined the detection of attacks against computer networks, which is becoming a harder problem to solve in the field of Network security. A problem with current intrusion detection systems is that they have many false positive and false negative events. Most of the existing Intrusion detection systems implemented depend on rule-based expert systems where new attacks are not detectabl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید