Results 291 to 300 of about 162,879 (307)
Some of the next articles are maybe not open access.
2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS), 2020
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Jiannan Liu +4 more
openaire +1 more source
With the rapid development of Internet, the issue of cyber security has increasingly gained more attention. An intrusion Detection System (IDS) is an effective technique to defend cyber-attacks and reduce security losses. However, the challenge of IDS lies in the diversity of cyber-attackers and the frequently-changing data requiring a flexible and ...
Jiannan Liu +4 more
openaire +1 more source
2022
Οι συσκευές που διαθέτουν ασύρματη σύνδεση στο Διαδίκτυο γίνονται διαδεδομένες. Κάθε μέρα, ο ρυθμός ανάπτυξης επιταχύνεται εκθετικά. Μέχρι το 2030, αναμένεται ότι κάθε άτομο θα έχει συνολικά 15 gadget συνδεδεμένα στο Διαδίκτυο. Ως αποτέλεσμα, μεταβαίνουμε σταδιακά από το Διαδίκτυο των Πραγμάτων στο Διαδίκτυο των Πάντων.
openaire +1 more source
Οι συσκευές που διαθέτουν ασύρματη σύνδεση στο Διαδίκτυο γίνονται διαδεδομένες. Κάθε μέρα, ο ρυθμός ανάπτυξης επιταχύνεται εκθετικά. Μέχρι το 2030, αναμένεται ότι κάθε άτομο θα έχει συνολικά 15 gadget συνδεδεμένα στο Διαδίκτυο. Ως αποτέλεσμα, μεταβαίνουμε σταδιακά από το Διαδίκτυο των Πραγμάτων στο Διαδίκτυο των Πάντων.
openaire +1 more source
Applied Mechanics and Materials, 2014
In the ear of information society, network security have become a very important issues. Intrusion is a behavior that tries to destroy confidentiality, data integrality, and data availability of network information. Intrusion detection systems are constructed as a software that automates the automatically detects possible intrusions.
openaire +2 more sources
In the ear of information society, network security have become a very important issues. Intrusion is a behavior that tries to destroy confidentiality, data integrality, and data availability of network information. Intrusion detection systems are constructed as a software that automates the automatically detects possible intrusions.
openaire +2 more sources
2007
This chapter provides an overview of the state of the art in intrusion detection systems. Intrusion detection systems are software/hardware components that monitor systems and analyze the events for intrusions. This chapter first provides a taxonomy of intrusion detection systems.
+4 more sources
This chapter provides an overview of the state of the art in intrusion detection systems. Intrusion detection systems are software/hardware components that monitor systems and analyze the events for intrusions. This chapter first provides a taxonomy of intrusion detection systems.
+4 more sources
A Review on Intrusion Detection Techniques and Intrusion Detection Systems in MANETs
2014 International Conference on Computational Intelligence and Communication Networks, 2014Over past few years, among wireless technologies, MANETs has become one of the most important and effective area in extending research capabilities. A great array of scope is lying as platform for research scholars as MANETs are vulnerable to attacks because of their high volatility in location and motion.
S. Sreenivasa Chakravarthi +1 more
openaire +1 more source
2008
In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion, denial of service attacks, or countless other abuses of computer and network resources. In particular, these threats continue to persist even on account of the flaws of current commercial Intrusion Detection Systems (IDS).
DI PIETRO R, MANCINI, Luigi Vincenzo
openaire +3 more sources
In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion, denial of service attacks, or countless other abuses of computer and network resources. In particular, these threats continue to persist even on account of the flaws of current commercial Intrusion Detection Systems (IDS).
DI PIETRO R, MANCINI, Luigi Vincenzo
openaire +3 more sources
Intrusion Detection System for Cloud Environment
Proceedings of the 7th International Conference on Security of Information and Networks, 2014Cloud computing environment is threatened by different types of cyber-attacks. This paper presents an implementation of intrusion detection system to secure virtualized servers on the cloud platform and validates intrusion detection system in detecting DDoS attack against the virtualized environment.
Bait Baraka, Hifaa, Tianfield, Huaglory
openaire +2 more sources
An Automatically Tuning Intrusion Detection System
IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics), 2007An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected.
Zhenwei, Yu +2 more
openaire +2 more sources
ULISSE, a network intrusion detection system
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead, 2008In this paper we present a tool for network anomaly detection and network intelligence which we named ULISSE. It uses a two tier architecture with unsupervised learning algorithms to perform network intrusion and anomaly detection. ULISSE uses a combination of clustering of packet payloads and correlation of anomalies in the packet stream.
openaire +3 more sources

