• No results found

[PDF] Top 20 Intrusion detection systems for IP telephony networks

Has 10000 "Intrusion detection systems for IP telephony networks" found on our website. Below are the top 20 most common "Intrusion detection systems for IP telephony networks".

Intrusion detection systems for IP telephony networks

Intrusion detection systems for IP telephony networks

... 3. Suspicious call patterns such as a number of parallel calls originated from different locations but using the same unique ID. This might indicate that a certain account has been corrupted. When comparing the approach ... See full document

10

Intrusion detection systems for intra vehicle networks : a review

Intrusion detection systems for intra vehicle networks : a review

... full detection capability of intra- vehicle attacks since each detection technique has its own shortcomings and merits, and thus the design process of IDS for intra-vehicle should consider the requirements ... See full document

25

Using Ontologies to Model Attacks in an Internet based Mobile Ad hoc Network (iMANET)

Using Ontologies to Model Attacks in an Internet based Mobile Ad hoc Network (iMANET)

... Ad-hoc Networks (iMANETs) has been ...an Intrusion Detection System ...help Intrusion Detection Systems recognize and add future attacks to its existing knowledge ... See full document

6

Intrusion Detection Systems for Community Wireless Mesh Networks

Intrusion Detection Systems for Community Wireless Mesh Networks

... The network in Wray has been operational for over three years, and is used by local residents for all manner of on- line tasks, including e-commerce and work-related activi- ties. In light of this, protection of the ... See full document

7

A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems

A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems

... business networks. They have combined the methods that are used in intrusion detection systems with a new honeypot system thereby to view current honeypot systems ...computer ... See full document

9

EXPLORING VARIOUS ASPECTS OF NEWORK SECURITY

EXPLORING VARIOUS ASPECTS OF NEWORK SECURITY

... The several strategies for addressing security concerns, such as encryption for confidentiality and integrity, reference monitors for access control, and overlapping controls for defense in depth. These strategies are ... See full document

6

Article Description

Article Description

... Detection Intrusion in networks and applications has become one of the most critical tasks to prevent their misuse by ...attackers. Intrusion detection started in 1980’s and since then ... See full document

9

An Overview of Intrusion Detection System

An Overview of Intrusion Detection System

... devices, Intrusion has become a major concern in businness sector as well as in research ...and networks resources intrusion detection identify any of the unauthorized use or misuse of the ... See full document

7

Cisco AVVID & IP Telephony pdf

Cisco AVVID & IP Telephony pdf

... both IP telephony and IP-based video-conferencing, creating an AVVID-enabled network requires a great deal of new ...servers, IP telephones,WebAttendant consoles, video gateways, gatekeepers, ... See full document

529

A survey of requirements and standardization efforts for IP telephony security

A survey of requirements and standardization efforts for IP telephony security

... Technology Systems generally has different dimen- sions: correctness, availability and ...in IP-Networks is more sophisticated than in ...using IP- Telephony Infrastructure is higher ... See full document

11

Intelligent intrusion detection systems using artificial neural networks

Intelligent intrusion detection systems using artificial neural networks

... based detection in NIDS in real-world scenarios are frequently plagued by false ...the detection of malicious shell- code - a high impact threat vector allowing attackers to obtain unauthorised commandline ... See full document

5

A novel framework for collaborative intrusion detection for M2M networks

A novel framework for collaborative intrusion detection for M2M networks

... an intrusion detec- tion similar to the [6] such as; both focus on using the network traffic of the devices for intrusion detection purposes, consider the resource-constrained 6LowPAN devices based ... See full document

6

Performance Improvement of Intrusion Detection Systems

Performance Improvement of Intrusion Detection Systems

... Managed Networks increase the hardware overheads and carry certain management inconveniences for network ...attack detection, and ...of intrusion-related ... See full document

8

Neural networks in intrusion detection systems

Neural networks in intrusion detection systems

... accurate detection of intrusions is necessary. For this purpose, Intrusion Detection Systems (IDS) were ...Misuse systems detect intrusions by looking for activity that corresponds to ... See full document

5

A Study of Deploying Intrusion Detection Systems in Mobile Ad Hoc Networks

A Study of Deploying Intrusion Detection Systems in Mobile Ad Hoc Networks

... deploying intrusion detection nodes. Some nodes performing Intrusion Detection Systems, IDS nodes for short, are used to mitigate ... See full document

5

Intrusion Detection Systems: A Survey and Taxonomy

Intrusion Detection Systems: A Survey and Taxonomy

... based detection systems, also referred to as a misuse detection; focuses on the network traffic and therefore attempts to catch any sequences or patterns of an inbound network traffic ...based ... See full document

6

Vulnerabilities and security limitations of current IP telephony systems

Vulnerabilities and security limitations of current IP telephony systems

... once IP phones (at the current security level) would be deployed regularly within publically accessible network segments of our ...use IP telephony - so scenarios planning to use two separate (then ... See full document

14

Detection of Sophisticated Network Enabled Threats via a Novel Micro Proxy Architecture

Detection of Sophisticated Network Enabled Threats via a Novel Micro Proxy Architecture

... be inspected and rules governing malicious behaviour applied [21]. Such approaches either make use of user defined rules to identify malicious activity, or else make use of learning algorithms to identify abnormal be- ... See full document

9

Evaluating and improving firewalls for ip telephony environments

Evaluating and improving firewalls for ip telephony environments

... supported. IP-Telephony applications are considered to have a huge economic potential in the near ...paper, IP-Telephony applications differ from those in many aspects, which makes such an ... See full document

6

Survey of intrusion detection systems: techniques, datasets and challenges

Survey of intrusion detection systems: techniques, datasets and challenges

... The evolution of malicious software (malware) poses a critical challenge to the design of intrusion detection systems (IDS). Malicious attacks have become more so- phisticated and the foremost ... See full document

22

Show all 10000 documents...