نتایج جستجو برای: intrusion response system

تعداد نتایج: 3050974  

Journal: :Open Computer Science 2012

Journal: :iranian journal of fuzzy systems 2014
mohammad reza moosavi mahsa fazaeli javan mohammad hadi sadreddini mansoor zolghadri jahromi

predicting different behaviors in computer networks is the subject of many data mining researches. providing a balanced intrusion detection system (ids) that directly addresses the trade-off between the ability to detect new attack types and providing low false detection rate is a fundamental challenge. many of the proposed methods perform well in one of the two aspects, and concentrate on a su...

Journal: :Wireless Personal Communications 2013
Robert Mitchell Ing-Ray Chen

In this paper we address the survivability issue of amobile cyber physical system (MCPS) comprising sensor-carried human actors, vehicles, or robots assembled together for executing a specific mission in battlefield or emergency response situations. We develop a mathematical model to assess the survivability property of aMCPS subject to energy exhaustion and security failure. Our model-based an...

Journal: :JNW 2013
Xufei Zheng Yonghui Fang Yanhui Zhou Jing Zhang

Today network security has become an everyday problem with virtually all computers connected to the Internet. Intrusion detection serves the important function of identifying malicious activities and determining their nature, origin, and seriousness. Inspired by the many excellent characteristics of biological immune System (BIS), the network intrusion detection system (NIDS) which based on art...

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

2015
Abhishek Sawant Jyoti Yadav Avneet Kaur Arora Janhavi Deo

This paper analysis and criticizes the way of using, functioning the intrusion detection system in data mining. Understanding the techniques. A survey on Data Mining based Intrusion Detection Systems phase, intrusion detection system is studied. are analysed using any network administrator. 1Data Mining and Optimization Research Group (DMO), Centre for Artificial Intrusion Detection System (IDS...

Journal: :Wireless Sensor Network 2010
Sathish Alampalayam Kumar

In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-incre...

2003
Mohan K. Chirumamilla Byrav Ramamurthy

Wireless LAN technology, despite the numerous advantages it has over competing technologies, has not seen widespread deployment. A primary reason for markets not adopting this technology is its failure to provide adequate security. Data that is sent over wireless links can be compromised with utmost ease. In this project, we propose a distributed agent based intrusion detection and response sys...

2017
Mohammed Ghaouth BELKASMI Mohammed SABER Sara CHADLI Mohamed EMHARRAF Ilhame EL FARISSI

Modern intrusion detection systems (IDS) are deployed in high-speed networks. Thus, they must be able to process a large amount of data in real time. This raises the issue of performance and required an evaluation of these IDS. We present in this paper an evaluation approach, based on a series of tests. The aim is to measure the performance of the components of an IDS and their effects on the e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید