Results 301 to 310 of about 157,047 (316)
Some of the next articles are maybe not open access.

Intrusion Detection Systems

Applied Mechanics and Materials, 2014
In the ear of information society, network security have become a very important issues. Intrusion is a behavior that tries to destroy confidentiality, data integrality, and data availability of network information. Intrusion detection systems are constructed as a software that automates the automatically detects possible intrusions.
openaire   +2 more sources

Intrusion Detection System for Cloud Environment

Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Cloud computing environment is threatened by different types of cyber-attacks. This paper presents an implementation of intrusion detection system to secure virtualized servers on the cloud platform and validates intrusion detection system in detecting DDoS attack against the virtualized environment.
Hifaa Bait Baraka, Huaglory Tianfield
openaire   +3 more sources

A Review on Intrusion Detection Techniques and Intrusion Detection Systems in MANETs

2014 International Conference on Computational Intelligence and Communication Networks, 2014
Over past few years, among wireless technologies, MANETs has become one of the most important and effective area in extending research capabilities. A great array of scope is lying as platform for research scholars as MANETs are vulnerable to attacks because of their high volatility in location and motion.
Suresh Veluru   +1 more
openaire   +2 more sources

Understanding Intrusion Detection Systems

EDPACS, 2001
Abstract I ntrusion detection is the process of detecting an unauthorized use of, or attack upon, a computer or a telecommunication network. Intrusion detection systems (IDSs)are designed and installed to aid in deterring or mitigating the damage that can be caused by hacking, or breaking into sensitive IT systems.
openaire   +2 more sources

Intrusion Prevention and Detection Systems

2009
With the increasing importance of information systems in today’s complex and global economy, it has become mission and business critical to defend those information systems from attack and compromise by any number of adversaries. Intrusion prevention and detection systems are critical components in the defender’s arsenal and take on a number of ...
openaire   +3 more sources

An Intrusion-Tolerant Mechanism for Intrusion Detection Systems

2008 Third International Conference on Availability, Reliability and Security, 2008
In accordance with the increasing importance of intrusion detection systems (IDS), users justifiably demand the trustworthiness of the IDS. However, sophisticated attackers attempt to disable the IDS before they launch a thorough attack. Therefore, to accomplish its function, an IDS should have some mechanism to guarantee uninterrupted detection ...
Mohammad Zulkernine, Liwei Kuang
openaire   +2 more sources

A survey of VoIP intrusions and intrusion detection systems

The 6th International Conference on Advanced Communication Technology, 2004., 2004
This paper presents a survey of the security problems in VoIP networks, with an emphasis on both intrusions and intrusion detection methods. It examines the intrusion issues in different components of VoIP systems, points to the strengths and shortcomings in the existing intrusion detection methods and intrusion detection systems and suggests possible ...
Son T. Vuong, Yan Bai
openaire   +2 more sources

Intrusion Detection System

2007
This chapter introduces the intrusion detection system (IDS). It starts with a brief explanation of the history of IDS and proceeds with generic components of IDS. Besides highlighting current advances in IDS, the chapter describes recent challenges to the system. The authors hope that this chapter sheds a light for readers who are unfamiliar with this
Robin Salim, G. S. V. Radha Krishna Rao
openaire   +1 more source

Intrusion and ransomware detection system

2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018
Attackers and cybercriminals are always in a race to either compromise networks and servers or embezzle ransoms through ransomware. Intruders must be prevented from such exploitations of assets, and their malicious attempts counterattacked. Among of the easiest ways of preventing intruders from compromising servers and networks is the use of ...
Marianne A. Azer, Ahmed El-Kosairy
openaire   +2 more sources

ULISSE, a network intrusion detection system

Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead, 2008
In this paper we present a tool for network anomaly detection and network intelligence which we named ULISSE. It uses a two tier architecture with unsupervised learning algorithms to perform network intrusion and anomaly detection. ULISSE uses a combination of clustering of packet payloads and correlation of anomalies in the packet stream.
openaire   +4 more sources

Home - About - Disclaimer - Privacy