Results 321 to 330 of about 1,142,874 (336)
Some of the next articles are maybe not open access.
2007
This chapter introduces the intrusion detection system (IDS). It starts with a brief explanation of the history of IDS and proceeds with generic components of IDS. Besides highlighting current advances in IDS, the chapter describes recent challenges to the system. The authors hope that this chapter sheds a light for readers who are unfamiliar with this
Robin Salim, G. S. V. Radha Krishna Rao
openaire +1 more source
This chapter introduces the intrusion detection system (IDS). It starts with a brief explanation of the history of IDS and proceeds with generic components of IDS. Besides highlighting current advances in IDS, the chapter describes recent challenges to the system. The authors hope that this chapter sheds a light for readers who are unfamiliar with this
Robin Salim, G. S. V. Radha Krishna Rao
openaire +1 more source
A survey of VoIP intrusions and intrusion detection systems
The 6th International Conference on Advanced Communication Technology, 2004., 2004This paper presents a survey of the security problems in VoIP networks, with an emphasis on both intrusions and intrusion detection methods. It examines the intrusion issues in different components of VoIP systems, points to the strengths and shortcomings in the existing intrusion detection methods and intrusion detection systems and suggests possible ...
Son T. Vuong, Yan Bai
openaire +2 more sources
Intrusion and ransomware detection system
2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018Attackers and cybercriminals are always in a race to either compromise networks and servers or embezzle ransoms through ransomware. Intruders must be prevented from such exploitations of assets, and their malicious attempts counterattacked. Among of the easiest ways of preventing intruders from compromising servers and networks is the use of ...
Marianne A. Azer, Ahmed El-Kosairy
openaire +2 more sources
High-performance intrusion detection system for networked UAVs via deep learning
Neural computing & applications (Print), 2022Q. Abu Al-haija, A. Al Badawi
semanticscholar +1 more source
ULISSE, a network intrusion detection system
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead, 2008In this paper we present a tool for network anomaly detection and network intelligence which we named ULISSE. It uses a two tier architecture with unsupervised learning algorithms to perform network intrusion and anomaly detection. ULISSE uses a combination of clustering of packet payloads and correlation of anomalies in the packet stream.
openaire +4 more sources
Research of Intrusion Detection System
2013 International Conference on Computational and Information Sciences, 2013Intrusion detection technology is one of the core technologies of dynamic security defense. It and static security technologies can form a strong network security system. Firstly, this article introduces the development of intrusion detection system. Secondly, this paper introduces the new technologies of intrusion detection system.
openaire +2 more sources
Journal of Ambient Intelligence and Humanized Computing, 2020
Mukaram Safaldin, M. Otair, L. Abualigah
semanticscholar +1 more source
Mukaram Safaldin, M. Otair, L. Abualigah
semanticscholar +1 more source
Intrusion Detection Systems and Intrusion Prevention Systems
Information Security Technical Report, 2005openaire +1 more source

