• Aucun résultat trouvé

intrusion detection systems

Node configuration for the Aho-Corasick algorithm in intrusion detection systems

Node configuration for the Aho-Corasick algorithm in intrusion detection systems

... In this paper, we analyze the performance and cost trade-off from selecting two representations of nodes when implementing the Aho-Corasick algorithm. This algorithm can be used for pattern matching in network-based ...

3

Towards privacy preserving cooperative cloud based intrusion detection systems

Towards privacy preserving cooperative cloud based intrusion detection systems

... in Intrusion Detection Systems Machine Learning (Michie, 1994) has been effectively utilized in calculating the accuracy of attack detection and ...

88

Performance analysis of wireless intrusion detection systems

Performance analysis of wireless intrusion detection systems

... of intrusion detection systems (IDSs), we also consider another important aspect which is the probability of occurrence of each extracted test ...

169

Scalable High-Performance Parallel Design for Network Intrusion Detection Systems on Many-Core Processors

Scalable High-Performance Parallel Design for Network Intrusion Detection Systems on Many-Core Processors

... P roposed design ∼ 7571 11.04 650 17.4 512-bytes packets and 7.2 Gbps for 100-bytes packets. Com- paring with current proposed NIDS systems on GPU, our parallel design on TILERAGX36 achieve a throughput per dollar ...

10

Growing hierarchical self-organizing map for alarm filtering in network intrusion detection systems

Growing hierarchical self-organizing map for alarm filtering in network intrusion detection systems

... ETECTION SYSTEMS The NIDS (Network Intrusion Detection System), software created to detect the abnormal activities on the network, generally function by signatures, on the same principle of ...

7

Efficient training data extraction framework for intrusion detection systems

Efficient training data extraction framework for intrusion detection systems

... VII. C ONCLUSION AN F UTURE W ORKS The main purpose of our work is to present a novel method for collecting real ground-truth training data for intrusion detection system. The lack of academic research in ...

5

Low-Rate False Alarm Anomaly-Based Intrusion Detection System with One-Class SVM

Low-Rate False Alarm Anomaly-Based Intrusion Detection System with One-Class SVM

... Anomaly-based intrusion detection systems can detect novel attacks, but they produce a high false alarm ...anomaly-based intrusion detection systems, we investigate the idea of ...

100

Intrusion detection in network systems through hybrid supervised and unsupervised mining process
- a detailed case study on the ISCX benchmark dataset -

Intrusion detection in network systems through hybrid supervised and unsupervised mining process - a detailed case study on the ISCX benchmark dataset -

... The SVM is one of the most successful classification algorithms in the field of data mining, but the training task is time-consuming (computationally expensive) for intrusion detection systems which ...

16

Intrusion Detection System Based on Sensed Relay Forwarded Packets in Wireless Sensor Networks

Intrusion Detection System Based on Sensed Relay Forwarded Packets in Wireless Sensor Networks

... in intrusion detection systems (IDSs) as a means of protecting the ...These systems are a kind of hybridization of the two previous seen ones: they use the specification rules to predict if a ...

73

Y-means: A Clustering Method for Intrusion Detection

Y-means: A Clustering Method for Intrusion Detection

... effective intrusion detection systems to protect our computers from these unauthorized or malicious ...for Intrusion Detection can only detect known intrusions since these methods ...

6

Anomaly-based network intrusion detection using machine learning

Anomaly-based network intrusion detection using machine learning

... • Integrity is defined by the ISO 27000 standard as the “property of accuracy and completeness” [10]. Integrity ensures that information is protected from being modified by unauthorized parties, or accidentally by ...

123

An Unsupervised Clustering Algorithm for Intrusion Detection

An Unsupervised Clustering Algorithm for Intrusion Detection

... As the Internet spreads to each corner of the world, computers are exposed to miscellaneous intrusions from the World Wide Web. Thus, we need effective intrusion detection systems to protect our ...

4

Impact of IT Monoculture on Behavioral End Host Intrusion Detection

Impact of IT Monoculture on Behavioral End Host Intrusion Detection

... Host Intrusion Detection Systems (HIDS) have become ubiqui- tous in enterprise networks since all laptops and desktops issued to employees come preconfigured with a HID system on ...These ...

10

Sequence Covering for Efficient Host-Based Intrusion Detection

Sequence Covering for Efficient Host-Based Intrusion Detection

... anomaly detection in sequential data [10] while focusing on intrusion detection in cyber- physical ...systems. Intrusion [11] refers to possible security breaches in ...

15

Intrusion Detection from Heterogenous Sensors

Intrusion Detection from Heterogenous Sensors

... d’intrusion, Intrusion Detection Systems (IDS) en anglais, jouent un rôle clé dans la surveillance et le contrôle des infrastructures de réseau ...

181

Risk monitoring with intrusion detection for industrial control systems

Risk monitoring with intrusion detection for industrial control systems

... Intrusion detection systems (IDS) are meant to fill the gap between the ex- pected and the real security ...of intrusion prevention systems ...that intrusion detection ...

177

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach

... network intrusion detection systems (IDS) usually rely on a central device, such as a gateway or a proxy, to analyze the network communications, in order to block unauthorized communications or to ...

9

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

... Consequently, Intrusion Detection Systems (IDS) are quickly becoming a popular requirement in building a network se- curity ...other systems over real traffic and a set of simulated ...

13

Theoretical and Applied Foundations for Intrusion Detection in Single and Federated Clouds

Theoretical and Applied Foundations for Intrusion Detection in Single and Federated Clouds

... Secondly, in the context of cloud-based cooperative IDS, while there are several cooperative models proposed to address the problem of limited information, by allowing to share know- ledge among cloud-based IDS, they ...

191

Random Partitioning Forest for Point-Wise and Collective Anomaly Detection - Application to Network Intrusion Detection

Random Partitioning Forest for Point-Wise and Collective Anomaly Detection - Application to Network Intrusion Detection

... No intrusion detection method is ...the detection models on which they are built are significantly different (forest of random partitioning trees for DiFF-RF and set of auto-encoders for ...

17

Show all 9468 documents...

Sujets connexes