• No results found

Intrusion response

Protecting Integrity of Networks using a Game Theoretic Intrusion Response and Recovery Engine
Kedasi Srinivas, Mr Anjaiah Adepu & M Mounika

Protecting Integrity of Networks using a Game Theoretic Intrusion Response and Recovery Engine Kedasi Srinivas, Mr Anjaiah Adepu & M Mounika

... delayed response, an automated intrusion response is required that provides instantaneous response to ...the intrusion response were ...actions, intrusion alerts) [24]. ...

5

Intrusion Response Decision making Method Based on Reinforcement Learning

Intrusion Response Decision making Method Based on Reinforcement Learning

... The essence of the intrusion response decision is to play against the attacker. If you can know the attacker's next attack path, attack intentions and other information, then you can make more effective ...

9

RRE leverages Intrusion Response and Recovery Engine
Afroz Fatima, Sumera Jabeen & Ms Saleha Farha

RRE leverages Intrusion Response and Recovery Engine Afroz Fatima, Sumera Jabeen & Ms Saleha Farha

... classes. Intrusion prevention methods that take actions to prevent occurrence of attacks is of ...The intrusion detection systems (IDSes), such as Snort, which try to detect inappropriate, incorrect, or ...

8

A Survey on Behaviour Based Intrusion Response System for Relational Database

A Survey on Behaviour Based Intrusion Response System for Relational Database

... to Intrusion Response for Relational Databases, their advantages and limitations and to propose a system that will make use of the advantages and overcome the ...of response system and overcome the ...

6

A Survey on Intrusion Response Mechanism for MANET Routing Attacks

A Survey on Intrusion Response Mechanism for MANET Routing Attacks

... 4. Intrusion response: With the output from risk assessment and decision-making module, the corresponding response actions, including routing table recovery and node isolation, are carried out to ...

7

Towards an effective intrusion response engine combined with intrusion detection in ad hoc networks

Towards an effective intrusion response engine combined with intrusion detection in ad hoc networks

... effective intrusion response engine combined with intrusion detection in ad hoc ...The intrusion response engine is composed of a secure communication module, a local and a global ...

9

RRE: Network Intrusion Detection System for Response and Recovery Engine

RRE: Network Intrusion Detection System for Response and Recovery Engine

... attack response tree into partially observable competitive Markov's decision processes that are solved to find the optimal response action against the attacker, in the sense that the maximum discounted ...

5

Intrusion Determent using Dempster-Shafer Theory          in MANET Routing

Intrusion Determent using Dempster-Shafer Theory in MANET Routing

... MANET intrusion response scenario, we introduce a new Dempster’s rule of combination with a notion of importance factors (IF) in D-S evidence model The chief characteristics and challenges of the MANETs [2] ...

5

Volume 3, Issue 3, March 2014 Page 282

Volume 3, Issue 3, March 2014 Page 282

... alarm response is a common passive response that simply informs the message receiver when the attack is ...the intrusion are automatically triggered when suspicious behaviors are detected and con- ...

6

NETWORK INTRUSION DETECTION AND RESPONSE SYSTEM FOR MOBILE AD HOC NETWORKS

NETWORK INTRUSION DETECTION AND RESPONSE SYSTEM FOR MOBILE AD HOC NETWORKS

... an intrusion detection and response model (IDRM) to enhance security in the Ad Hoc On Demand Distance Vector (AODV) routing protocol ...initiators response. In the intrusion response ...

12

Intrusion Detection and Response Model for Mobile Ad Hoc Networks Using Fuzzy Logic

Intrusion Detection and Response Model for Mobile Ad Hoc Networks Using Fuzzy Logic

... parameters.The response framework of the IDRMAN is invoked when the detection framework identifies an ...The response framework has an intruder identification component and an intrusion ...

9

Incorporation of Human Resistant System and Advance Network Security System to Improve Computer Security

Incorporation of Human Resistant System and Advance Network Security System to Improve Computer Security

... detect intrusion attempts in real-time based on Intrusion Detection System ...an Intrusion Response System (IRS) is activated in response to alerts generated by the IDS in order to ...

9

A Review - Anomaly Based Network Security Using Response Recovery Engine Ganesh Ghodke, Vaibhav Sarode, Sagar Valmiki, Prof. Patil S. S., Prof. Kothawale G. S.

A Review - Anomaly Based Network Security Using Response Recovery Engine Ganesh Ghodke, Vaibhav Sarode, Sagar Valmiki, Prof. Patil S. S., Prof. Kothawale G. S.

... possible intrusion and response scenarios for the attacker and response engine, ...optimal response action against the attacker, in the sense that the maximum discounted accumulative damage ...

8

Anomaly Based Network Security Using Response and Recovery Engine

Anomaly Based Network Security Using Response and Recovery Engine

... host-based intrusion response is taken into account by RRE’s local engines using local ART graphs and the IDS rule-set for computing assets, for example, the SQL server, maintenance of global network-level ...

9

A Review on Hybrid Intrusion Detection System using Artificial Immune System Approaches

A Review on Hybrid Intrusion Detection System using Artificial Immune System Approaches

... network-based intrusion detection system is placed on the network for capturing the traffic, active services and servers for detecting, blocking and reporting of any unauthorized access of the ...

6

3043 0 200111 03 pdf

3043 0 200111 03 pdf

... DoS intrusion is to overwhelm the victim host with a huge amount of ...SYN-flood intrusion uses most of the computational re- sources of the victim host by opening many half-open TCP/IP ...of ...

21

APPLICATION OF FITNESS SWITCHING GENETIC ALGORITHM FOR SOLVING 0 1 KNAPSACK 
PROBLEM

APPLICATION OF FITNESS SWITCHING GENETIC ALGORITHM FOR SOLVING 0 1 KNAPSACK PROBLEM

... system intrusion by monitoring network anomaly[23]. An intrusion detection system is considerably noted for a mechanism that protects the network system by keeping confidentiality, integrity and ...

9

Intrusion Detection System by using K Means Clustering, C 4 5, FNN, SVM Classifier

Intrusion Detection System by using K Means Clustering, C 4 5, FNN, SVM Classifier

... attackers. intrusion detection system plays a important role in day to day ...day intrusion detection creates the FP (false positive), FN (false negative), TP (true positive), TN (true ...

5

Prioritizing Countermeasures for Reducing Seawater-Intrusion Area by Considering of Regional Characteristics Using SEAWAT and a Multi-Criteria Decision-Making Method

Prioritizing Countermeasures for Reducing Seawater-Intrusion Area by Considering of Regional Characteristics Using SEAWAT and a Multi-Criteria Decision-Making Method

... recharge amount, groundwater usage per unit area, current seawater intrusion area ratio, future 359. seawater intrusion area ratio, and average seawater intrusion ar[r] ...

19

Enhancing quick reduct algorithm for unsupervised based network 
		intrusion detection

Enhancing quick reduct algorithm for unsupervised based network intrusion detection

... Network intrusion detection has been identified as one of the most challenging needs of the network security community in recent ...years. Intrusion detection systems (IDS) can analyze a large amount of ...

5

Show all 10000 documents...

Related subjects