Results 1 to 10 of about 988,021 (259)
Enhanced Network Intrusion Detection System [PDF]
A reasonably good network intrusion detection system generally requires a high detection rate and a low false alarm rate in order to predict anomalies more accurately.
Ketan Kotecha+8 more
doaj +6 more sources
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network [PDF]
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
A. F. M. Sultanul Kabir+2 more
core +3 more sources
Intelligent multi-agent system for intrusion detection and countermeasures [PDF]
Intelligent mobile agent systems offer a new approach to implementing intrusion detection systems (IDS). The prototype intrusion detection system, MAIDS, demonstrates the benefits of an agent-based IDS, including distributing the computational effort ...
Helmer, Guy Gary
core +4 more sources
Intrusion detection system episteme
Abstract In our paper we investigate the possibilities of modal logics in coalgebras of program systems. We deal with a simplified model of an intrusion detection system. We model an intrusion detection system as a coalgebra and construct its Kripke model of coalgebraic modal linear logic using powerset endofunctor.
Mihályi Daniel+2 more
doaj +3 more sources
Intrusion Detection System [PDF]
Intrusion Detection System (IDS) is well-defined as a Device or software application which monitors the system activities and finds if there is any malevolent activity that has occured. Unresolved growth and traditional use of internet raises anxieties about how to connect and protect the digital information securely.
Sangram Nevse+4 more
openaire +2 more sources
Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study [PDF]
Anomaly-based intrusion detection systems classify network traffic instances by comparing them with a model of the normal network behavior. To be effective, such systems are expected to precisely detect intrusions (high true positive rate) while limiting
Boer, Pieter-Tjerk de+4 more
core +19 more sources
HDLNIDS: Hybrid Deep-Learning-Based Network Intrusion Detection System
Attacks on networks are currently the most pressing issue confronting modern society. Network risks affect all networks, from small to large. An intrusion detection system must be present for detecting and mitigating hostile attacks inside networks ...
Emad Ul Haq Qazi+2 more
doaj +1 more source
A Cloud Based Network Intrusion Detection System
Along with the development of intrusion detection systems so far, remarkable results have been achieved in aspects of dynamic monitoring and network defense.
Li You, Zhanyong Wang
doaj +1 more source
Study on Distributed Intrusion Detection System Based on Artificial Intelligence [PDF]
In order to solve the problems of data processing defects and low system intrusion accuracy existing in the current dynamic loading system,a distributed intrusion detection system with complete functions and strong practicability is designed by taking ...
WANG Lu, WEN Wu-song
doaj +1 more source
Evaluation of intrusion detection systems [PDF]
This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric.
John E. Gaffney, Jacob W. Ulvila
openaire +2 more sources