Results 271 to 280 of about 53,015 (296)
Some of the next articles are maybe not open access.
Intrusion Detection Force: an infrastructure for Internet-scale intrusion detection
First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings., 2003Intrusion detection systems (IDSs) are usually deployed within the confines of an organization. There is usually no exchange of information between an IDS in one organization with those in other organizations. The effectiveness of IDSs at detecting present-day sophisticated attacks would increase significantly if there are inter-organizational ...
Gail-Joon Ahni, Yuliang Zheng, L. Teo
openaire +2 more sources
Intrusion Detection and Prevention
2020This chapter provides a study regarding the important topics of cyber threat intrusion detection and prevention with regard to identifying malicious incidents, logging information about them, attempting to stop them and reporting the identified malicious attack to the incident response teams.
openaire +2 more sources
A Review on Intrusion Detection Techniques and Intrusion Detection Systems in MANETs
2014 International Conference on Computational Intelligence and Communication Networks, 2014Over past few years, among wireless technologies, MANETs has become one of the most important and effective area in extending research capabilities. A great array of scope is lying as platform for research scholars as MANETs are vulnerable to attacks because of their high volatility in location and motion.
Suresh Veluru +1 more
openaire +2 more sources
Towards scalable intrusion detection
Network Security, 2009We raise some questions that need to be addressed to overcome the scalability challenges that intrusion detection systems face. We also take this opportunity to highlight some of the recent related work and put it in context.
Howard Chivers +4 more
openaire +2 more sources
Network Security, 2000
Intrusion Detection by Rebecca Bace is an intriguing book that focuses on intrusion detection, yet covers a lot more than pure intrusion detection-related issues. In a nutshell, this book covers what intrusion detection is, its history, why it is important, types of intrusion detection systems (IDSs) that have been developed over the years, ways to do ...
openaire +2 more sources
Intrusion Detection by Rebecca Bace is an intriguing book that focuses on intrusion detection, yet covers a lot more than pure intrusion detection-related issues. In a nutshell, this book covers what intrusion detection is, its history, why it is important, types of intrusion detection systems (IDSs) that have been developed over the years, ways to do ...
openaire +2 more sources
Characterising intrusion detection sensors
Network Security, 2008An intrusion detection sensor is defined as a device that collects and analyses network traffic for the purpose of identifying suspicious events. Too often the value of a sensor is associated with its data collection and analysis features. Experience tells us such sensors fall under a range of different types and are diverse in their operational ...
Philip Nobles +4 more
openaire +2 more sources
On collaborative intrusion detection
2016Cyber-attacks have nowadays become more frightening than ever before. The growing dependency of our society on networked systems aggravates these threats; from interconnected corporate networks and Industrial Control Systems (ICSs) to smart households, the attack surface for the adversaries is increasing.
openaire +1 more source
Intrusion Detection in the Cloud
2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. IDS management is an important capability for distributed IDS solutions, which makes it possible to integrate and handle different types of sensors or collect and synthesize alerts generated from multiple hosts located in the ...
Feng Cheng +2 more
openaire +2 more sources
Autonomic Intrusion Detection System
2009Abstract. We propose a novel framework of autonomic intrusion detection that fulfills online and adaptive intrusion detection in unlabeled audit data streams. The framework owns ability of self-managing: self-labeling, self-updating and self-adapting.
Wang, Wei +2 more
openaire +2 more sources
Detecting Signs of Intrusion. [PDF]
Abstract : The module provides concrete, practical guidance to help organizations improve the security of their networked computer systems. It describes a set of practices that can help detect intrusions by looking for the fingerprints of known intrusion methods.
Robert Firth +4 more
openaire +1 more source

