Results 301 to 310 of about 404,854 (339)

Machine learning based intrusion detection framework for detecting security attacks in internet of things. [PDF]

open access: yesSci Rep
Kantharaju V   +5 more
europepmc   +1 more source

An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection

2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), 2020
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Lirong Chen   +4 more
openaire   +1 more source

Intrusion Detection in VANETs [PDF]

open access: possible2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 2021
Vehicular Ad hoc Networks commonly abbreviated as VANETs, are an important component of MANET. VANET refers to the group of vehicles that are interlinked to one another through wireless network. Along with technology, comes the threats. Like other wireless networks, VANETs also are vulnerable to various security threats.
Alka Chaudhary, Ajay Rana, Ila Naqvi
openaire   +1 more source

An Intrusion-Detection Model [PDF]

open access: possibleIEEE Transactions on Software Engineering, 1986
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
openaire   +2 more sources

Intrusion-Tolerant Intrusion Detection System [PDF]

open access: possible, 2004
Recently, numerous studies have focused on multi-agentbased intrusion detection systems (IDSs) in order to detect intrusion behavior more efficiently. However, since an agent is easily subverted by a process that is faulty, a multi-agent based intrusion detection system must be fault tolerant by being able to recover from system crashes, caused either ...
Chong-Sun Hwang, Myung-Kyu Yi
openaire   +1 more source

Intrusion Detection Systems

2019
The automation of packet analysis, even partially, is very much desired, because packet analysis is time-consuming and requires technical knowledge and skills. This paper presents the Packet Analysis Ontology (PAO), a novel OWL ontology that covers the terminology of packet analysis, including concepts and properties, as well as their restrictions, to ...
Brooks, David J., Coole, Michael
openaire   +3 more sources

Overview of intrusion detection and intrusion prevention

Proceedings of the 5th annual conference on Information security curriculum development, 2008
This report provides an overview of IPS systems. In the first section a comparison of IDS and IPS is made, where an IPS system is defined as an integration of IDS and a firewall. The second section describes what is needed to set up an IPS system. In the third section, IPS alternatives are discussed for different types of organizations.
Meg Murray, Mario Guimaraes
openaire   +2 more sources

Home - About - Disclaimer - Privacy