• No results found

computer network intrusion detection

Intrusion Detection in Computer Network

Intrusion Detection in Computer Network

... of computer networks brings many security threats. Intrusion Detection System (IDS) is a mean to provide network ...of intrusion detection in network utilizing Traffic ...

44

A New Distributed Intrusion Detection System in Computer Network: An Approach to Detect Malicious Intrusion Threats at Initial Stage

A New Distributed Intrusion Detection System in Computer Network: An Approach to Detect Malicious Intrusion Threats at Initial Stage

... new, network security methods are ...Internet, computer connectivity and our manifold growing dependency on them, threat perception can have worst ...of Intrusion Detection Systems (IDS) along ...

7

Application of Self-Organizing Feature Map Neural Network Based on K-means Clustering in Network Intrusion Detection

Application of Self-Organizing Feature Map Neural Network Based on K-means Clustering in Network Intrusion Detection

... to computer systems attack, which brings urgent need for the intrusion detection ...Recently, network intrusion detection has been one of the most important technologies in ...

14

A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks

A Secure Intrusion Detection System for Heterogeneous Wireless Sensor Networks

... An intrusion detection system is used to detect several types of ma- licious behaviors that can compromise the security and trust of a computer ...includes network attacks against vulnera- ble ...

8

Volume 2, Issue 8, August 2013 Page 286

Volume 2, Issue 8, August 2013 Page 286

... of computer network has become main stream in most of everyone’s ...on computer security is centred on the tools or techniques used in protecting and defending ...in Network defense will be ...

8

Intrusion Detection Systems: A Survey and Taxonomy

Intrusion Detection Systems: A Survey and Taxonomy

... possible. Intrusion Detection System (IDS) is a security system, in which prevents identified attacks from a computer or a network ...system. Intrusion Detection Systems has ...

6

Intrusion Detection Using Data Mining Technique (Classification)

Intrusion Detection Using Data Mining Technique (Classification)

... and intrusion detection system, IDS is a necessary tool in any ...for computer security in both public and private is obvious Intrusion detection system provides the crucial component ...

5

Neural Networks for Intrusion Detection and Its Applications

Neural Networks for Intrusion Detection and Its Applications

... of. Computer Science, Sri Venkateswara University College of Commerce Management and Computer Science, Tirupati ...of Computer Applications and Doctorate in Computer Science from ...in ...

5

Home-Based Intrusion Detection System

Home-Based Intrusion Detection System

... straight computer security methods. Anderson mentioned that intrusion is an attempt or a danger to use deliberate illegal ...outsider intrusion detection for operators, network and ...

5

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 1, Jan-Feb 2015

... with network attacks by criminals, thieves or terrorists. Intrusion detection system (IDS) is use to identify malicious attempts over the network and protecting the ...An intrusion ...

5

Detecting Zero-Day Attack Signatures using Honeycomb in a Virtualized Network

Detecting Zero-Day Attack Signatures using Honeycomb in a Virtualized Network

... regular computer systems via exploiting memory-related vulnerabilities which present threats to computer ...human intrusion impossible. The new worms are spread over the network on regular ...

6

Intrusion Detection for the Malignant Activities in MANET

Intrusion Detection for the Malignant Activities in MANET

... An intrusion-detection-system (IDS) is the security-system which controls computer system and the traffic of network and observes that traffic for the possible antagonistic attacks derived ...

6

Anomaly Detection Using Context-Based Intrusion
          Detection System

Anomaly Detection Using Context-Based Intrusion Detection System

... computer network and protects it from unauthorized users, including sometimes insiders ...DARPA Intrusion Detection Evaluation Program to do further studies and specifications in ...

6

DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK

DOS ATTACKS IN INTRUSION DETECTION AND INHIBITION TECHNOLOGY FOR WIRELESS COMPUTER NETWORK

... This attack also leverages active mobile sessions in the network. It sends packets to a mobile device to prevent the device from going into sleep mode. The attack can involve as little as sending 40 bytes every 10 ...

8

A new intrusion detection and alarm correlation technology based on neural network

A new intrusion detection and alarm correlation technology based on neural network

... of computer networks, the security of the network has become increasingly ...to network security is the intrusion of information systems through the ...network. Intrusion ...

10

Network Intrusion Detection

Network Intrusion Detection

... single computer can monitor the network and house the management applications (SnortCenter and ...One computer can perform the management functions while other computers act as ...

18

Title: A Protocol Based Packet Sniffer

Title: A Protocol Based Packet Sniffer

... Intrusion detection system (IDS) is a type of security management system for computers and ...An Intrusion Detection system gathers and analyzes information from various areas within a ...

5

Empirical Analysis of User’s Log Activities for
Misuse Detection: A SNORT Based Study

Empirical Analysis of User’s Log Activities for Misuse Detection: A SNORT Based Study

... Intrusion Detection Systems (IDS) facilitate computer systems organize for and deal with ...of computer systems and networks, and analyze this information for security ...the network ...

6

A Survey of MANET Intrusion Detection and Prevention Approaches for Network Layer Attacks

A Survey of MANET Intrusion Detection and Prevention Approaches for Network Layer Attacks

... anomaly detection was conducted by Ye et ...detecting intrusion into the information system in fixed ...collecting computer audit data from a Sun SPARC workstation running the Solaris operating ...

20

Show all 10000 documents...

Related subjects