Results 261 to 270 of about 53,015 (296)
Some of the next articles are maybe not open access.
2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), 2020
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Lirong Chen +4 more
openaire +1 more source
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Lirong Chen +4 more
openaire +1 more source
An Intrusion-Detection Model [PDF]
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
openaire +2 more sources
Intrusion Detection in VANETs [PDF]
Vehicular Ad hoc Networks commonly abbreviated as VANETs, are an important component of MANET. VANET refers to the group of vehicles that are interlinked to one another through wireless network. Along with technology, comes the threats. Like other wireless networks, VANETs also are vulnerable to various security threats.
Alka Chaudhary, Ajay Rana, Ila Naqvi
openaire +1 more source
Overview of intrusion detection and intrusion prevention
Proceedings of the 5th annual conference on Information security curriculum development, 2008This report provides an overview of IPS systems. In the first section a comparison of IDS and IPS is made, where an IPS system is defined as an integration of IDS and a firewall. The second section describes what is needed to set up an IPS system. In the third section, IPS alternatives are discussed for different types of organizations.
Meg Murray, Mario Guimaraes
openaire +2 more sources
Intrusion-Tolerant Intrusion Detection System [PDF]
Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Chong-Sun Hwang, Myung-Kyu Yi
openaire +1 more source
Intrusion Detection and Response
2006This chapter discusses the notion of intrusion detection and introduces concepts associated with intrusion detection and methods used to respond to intrusions. It presents information about different forms of intrusions and how they are recognized. It introduces methods for detecting intrusions and then discusses possible responses to those intrusions.
David A. Dampier, Ambareen Siraj
openaire +1 more source
2008
In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion, denial of service attacks, or countless other abuses of computer and network resources. In particular, these threats continue to persistdue to the flaws ofcurrent commercial intrusion detection systems (IDSs).Intrusion Detection Systems is an edited volume ...
DI PIETRO R, MANCINI, Luigi Vincenzo
openaire +4 more sources
In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion, denial of service attacks, or countless other abuses of computer and network resources. In particular, these threats continue to persistdue to the flaws ofcurrent commercial intrusion detection systems (IDSs).Intrusion Detection Systems is an edited volume ...
DI PIETRO R, MANCINI, Luigi Vincenzo
openaire +4 more sources
Intrusion Detection in Cloud Computing
2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2013Cloud Computing represents both a technology for using computing infrastructures in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures become an attractive target for intruders.
FICCO, Massimo +2 more
openaire +4 more sources
Wireless Intrusion Detection: Not as easy as traditional network intrusion detection
TENCON 2005 - 2005 IEEE Region 10 Conference, 2005While wireless networks are growing in popularity, monitoring these networks for abuse and intrusions is almost nonexistent. Although some intrusion prevention systems have recently appeared on the market, their intrusion detection capabilities are limited. Real intrusion detection in wireless networks is not a simple add on.
A.B. Ruighaver, Zhiqi Tao
openaire +2 more sources

