نتایج جستجو برای: Intrusion Signature

تعداد نتایج: 83518  

Mehdi Abadi Sa'eed Jalili

In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

Journal: :نشریه دانشکده فنی 0
مهدی آبادی سعید جلیلی

in this paper, we propose an approach for automatic generation of novel intrusion signatures. this approach can be used in the signature-based network intrusion detection systems (nidss) and for the automation of the process of intrusion detection in these systems. in the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

Nowadays, Network Intrusion Detection Systems (NIDS) are widely used to provide full security on computer networks. IDS are categorized into two primary types, including signature-based systems and anomaly-based systems. The former is more commonly used than the latter due to its lower error rate. The core of a signature-based IDS is the pattern matching. This process is inherently a computatio...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشکده علوم زمین سازمان زمین شناسی و اکتشافات مع 1390

the neogene intrusion masses in the noudeh-enghelab area located to the north of sabzevar ophiolite have cut the late cretaceous ophiolitic rocks, sedimentary- volcanic and eocene volcanic rocks and have been covered by pliocene and quaternary deposits. the margin is of lava with basalt, phyric andesite-basalt and andesite and the central parts (dome shaped) composed of phyric andesite-trachyan...

2008
Liberios VOKOROKOS Anton BALÁŽ Norbert ÁDÁM

The goal of this paper is to present designed architecture of intrusion detection system based on events planning and intrusion signature. The article describes problematic of the variation of intrusions and intrusion detection systems. The core of the proposed architecture is intrusion signature matching through petri nets that clasify system behaviour and determine potential intrusion of moni...

Journal: :J. Inf. Sci. Eng. 2006
Ill-Young Weon Doo Heon Song Chang-Hoon Lee

In the field of network intrusion detection, both the signature-based intrusion detection system and the machine learning-based intrusion detection system possess advantages and disadvantages. When the two discrepant systems are combined in a way that the former is used as the main system and the latter as a supporting system, the machine learning-based intrusion detection system measures the v...

Journal: :CoRR 2013
Saravanan Kumarasamy B. Hemalatha P. Hashini

Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process. Two types of intrusion detection systems are available. They are a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید باهنر کرمان - دانشکده ریاضی و کامپیوتر 1391

امروزه با گسترش شبکه های کامپیوتری، بحث امنیت شبکه بیش از گذشته مورد توجه پژوهشگران قرار گرفته است. در این راستا تشخیص نفوذ به عنوان یکی از اجزای اصلی برقراری امنیت در شبکه های کامپیوتری شناخته می شود. شناسایی نفوذ در شبکه های کامپیوتری و جلوگیری از آن به عنوان یکی از مباحث اصلی در همایش های امنیتی جوامع پیشرفته مطرح می باشد. در این راستا روش های گوناگونی جهت مقابله با حملات در قالب سیستم های ت...

2016
Sree Kala A. Christy

Nowadays the organizations are facing the number of threats every day in the form of viruses and attack etc. Since many different mechanisms were preferred by organizations in the form of intrusion detection and prevention system to protect its organizations from these kinds of attacks. Intrusion Detection System (IDS) is considered as a system integrated with intelligent subsystems. In this pa...

2001
Anita Jones Song Li

We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at the University of New Mexico that uses a system call sequence as a signature. Intrusions are detected by comparing the signature of the intrusion and that of the normal application. But when the system call sequences g...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید