Results 281 to 290 of about 208,052 (306)
Some of the next articles are maybe not open access.

Intrusion Detection in Cloud Computing

2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2013
Cloud Computing represents both a technology for using computing infrastructures in a more efficient way, and a business model for selling computing resources and services. On the other hand, such complex and distributed architectures become an attractive target for intruders.
FICCO, Massimo   +2 more
openaire   +3 more sources

A Review on Intrusion Detection Techniques and Intrusion Detection Systems in MANETs

2014 International Conference on Computational Intelligence and Communication Networks, 2014
Over past few years, among wireless technologies, MANETs has become one of the most important and effective area in extending research capabilities. A great array of scope is lying as platform for research scholars as MANETs are vulnerable to attacks because of their high volatility in location and motion.
S. Sreenivasa Chakravarthi   +1 more
openaire   +1 more source

Intrusion Detection Force: an infrastructure for Internet-scale intrusion detection

First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings., 2003
Intrusion detection systems (IDSs) are usually deployed within the confines of an organization. There is usually no exchange of information between an IDS in one organization with those in other organizations. The effectiveness of IDSs at detecting present-day sophisticated attacks would increase significantly if there are inter-organizational ...
L. Teo   +2 more
openaire   +1 more source

An Intrusion-Tolerant Mechanism for Intrusion Detection Systems

2008 Third International Conference on Availability, Reliability and Security, 2008
In accordance with the increasing importance of intrusion detection systems (IDS), users justifiably demand the trustworthiness of the IDS. However, sophisticated attackers attempt to disable the IDS before they launch a thorough attack. Therefore, to accomplish its function, an IDS should have some mechanism to guarantee uninterrupted detection ...
Liwei Kuang, Mohammad Zulkernine
openaire   +1 more source

A survey of VoIP intrusions and intrusion detection systems

The 6th International Conference on Advanced Communication Technology, 2004., 2004
This paper presents a survey of the security problems in VoIP networks, with an emphasis on both intrusions and intrusion detection methods. It examines the intrusion issues in different components of VoIP systems, points to the strengths and shortcomings in the existing intrusion detection methods and intrusion detection systems and suggests possible ...
null Son Vuong, null Yan Bai
openaire   +1 more source

Intrusion-Tolerant Intrusion Detection System

2004
Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Myung-Kyu Yi, Chong-Sun Hwang
openaire   +1 more source

Intrusion Detection in the Cloud

2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009
Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. IDS management is an important capability for distributed IDS solutions, which makes it possible to integrate and handle different types of sensors or collect and synthesize alerts generated from multiple hosts located in the ...
Sebastian Ros   +2 more
openaire   +1 more source

Intrusion Detection: Introduction to Intrusion Detection and Security Information Management

2005
This paper covers intrusion detection and security information management technologies. It presents a primer on intrusion detection, focusing on data sources and analysis techniques. Data sources presented therein are classified according to the capture mechanism and we include an evaluation of the accuracy of these data sources.
Hervé Debar, Jouni Viinikka
openaire   +1 more source

Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System

2019
New information and communication technologies are increasingly dominating our daily lives to the point of becoming indispensable. The computerization of society is now a reality, no sector is aloof from this transformation. This human invention, which has made progress, certainly facilitated the lives of human beings, but at the same time generated ...
El Mostafa Rajaallah   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy