Results 271 to 280 of about 53,015 (296)
Some of the next articles are maybe not open access.

Intrusion Detection Force: an infrastructure for Internet-scale intrusion detection

First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings., 2003
Intrusion detection systems (IDSs) are usually deployed within the confines of an organization. There is usually no exchange of information between an IDS in one organization with those in other organizations. The effectiveness of IDSs at detecting present-day sophisticated attacks would increase significantly if there are inter-organizational ...
Gail-Joon Ahni, Yuliang Zheng, L. Teo
openaire   +2 more sources

Intrusion Detection and Prevention

2020
This chapter provides a study regarding the important topics of cyber threat intrusion detection and prevention with regard to identifying malicious incidents, logging information about them, attempting to stop them and reporting the identified malicious attack to the incident response teams.
openaire   +2 more sources

A Review on Intrusion Detection Techniques and Intrusion Detection Systems in MANETs

2014 International Conference on Computational Intelligence and Communication Networks, 2014
Over past few years, among wireless technologies, MANETs has become one of the most important and effective area in extending research capabilities. A great array of scope is lying as platform for research scholars as MANETs are vulnerable to attacks because of their high volatility in location and motion.
Suresh Veluru   +1 more
openaire   +2 more sources

Towards scalable intrusion detection

Network Security, 2009
We raise some questions that need to be addressed to overcome the scalability challenges that intrusion detection systems face. We also take this opportunity to highlight some of the recent related work and put it in context.
Howard Chivers   +4 more
openaire   +2 more sources

Intrusion Detection

Network Security, 2000
Intrusion Detection by Rebecca Bace is an intriguing book that focuses on intrusion detection, yet covers a lot more than pure intrusion detection-related issues. In a nutshell, this book covers what intrusion detection is, its history, why it is important, types of intrusion detection systems (IDSs) that have been developed over the years, ways to do ...
openaire   +2 more sources

Characterising intrusion detection sensors

Network Security, 2008
An intrusion detection sensor is defined as a device that collects and analyses network traffic for the purpose of identifying suspicious events. Too often the value of a sensor is associated with its data collection and analysis features. Experience tells us such sensors fall under a range of different types and are diverse in their operational ...
Philip Nobles   +4 more
openaire   +2 more sources

On collaborative intrusion detection

2016
Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our society on networked systems aggravates these threats; from interconnected corporate networks and Industrial Control Systems (ICSs) to smart households, the attack surface for the adversaries is increasing.
openaire   +1 more source

Intrusion Detection in the Cloud

2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009
Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. IDS management is an important capability for distributed IDS solutions, which makes it possible to integrate and handle different types of sensors or collect and synthesize alerts generated from multiple hosts located in the ...
Feng Cheng   +2 more
openaire   +2 more sources

Autonomic Intrusion Detection System

2009
Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns ability of self-managing: self-labeling, self-updating and self-adapting.
Wang, Wei   +2 more
openaire   +2 more sources

Detecting Signs of Intrusion. [PDF]

open access: possible, 1997
Abstract : The module provides concrete, practical guidance to help organizations improve the security of their networked computer systems. It describes a set of practices that can help detect intrusions by looking for the fingerprints of known intrusion methods.
Robert Firth   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy