• Aucun résultat trouvé

Network Intrusion Detection System

Network intrusion detection system for drone fleet using both spectral analysis and robust controller / observer

Network intrusion detection system for drone fleet using both spectral analysis and robust controller / observer

... of intrusion we generate in the network, are used to select the accurate model for robust control ...hoc network traffic. Moreover, several research studies on network anomaly estimation have ...

14

Growing hierarchical self-organizing map for alarm filtering in network intrusion detection systems

Growing hierarchical self-organizing map for alarm filtering in network intrusion detection systems

... (Network Intrusion Detection System), software created to detect the abnormal activities on the network, generally function by signatures, on the same principle of anti-virus softwares ...

7

Efficient training data extraction framework for intrusion detection systems

Efficient training data extraction framework for intrusion detection systems

... (Network Intrusion Detection system) is an effective approach for dealing with these security ...Their detection engines use two main approaches to inspect malicious traffic; misuse ...

5

An intrusion detection system on network security for web application

An intrusion detection system on network security for web application

... As the illustration in Figure 3-1 , Analysis Engine retrieves configuration and profile information from database for intrusion analysis, and Response Module saves ma[r] ...

100

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

... OCMAS-IDS system, an ontology, called ASO (Attack Signatures based Ontology), is implemented, in order to optimize the knowledge representa- tion and to incorporate more intelligence in the information ...by ...

13

Intrusion Detection System Based on Sensed Relay Forwarded Packets in Wireless Sensor Networks

Intrusion Detection System Based on Sensed Relay Forwarded Packets in Wireless Sensor Networks

... more network interfaces that act as gateway between the WSN and the user network ...the network sending only relevant information to the ...the network lifetime. In multi-hop transmission, the ...

73

Performance analysis of wireless intrusion detection systems

Performance analysis of wireless intrusion detection systems

... the system as a first line of ...changed network topologies [Bidg06], openness of wireless medium, system complexity, design and implementation flaws, configuration and administration errors, ...

169

Random Partitioning Forest for Point-Wise and Collective Anomaly Detection - Application to Network Intrusion Detection

Random Partitioning Forest for Point-Wise and Collective Anomaly Detection - Application to Network Intrusion Detection

... to network intrusion detection ...almost system- atically outperforms the IF algorithm and one of its extended variant, but also challenges the one-class SVM baseline, deep learning ...

17

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach

... The implementation of the proposed approach is based on the deployment in a smarthome of a set of probes to capture the radio communication activities on predefined frequency bandwidths, using Software Defined Radio ...

9

Low-Rate False Alarm Anomaly-Based Intrusion Detection System with One-Class SVM

Low-Rate False Alarm Anomaly-Based Intrusion Detection System with One-Class SVM

... anomaly-based intrusion detection ...a system that can detect attacks with the contribution of reducing the false alarm ...core network design and management, and monitoring and customizing ...

100

Impact of IT Monoculture on Behavioral End Host Intrusion Detection

Impact of IT Monoculture on Behavioral End Host Intrusion Detection

... evading detection, attackers try to hide inside normal traffic patterns by commanding zombies to in- crease their traffic in ways that are not too dissimilar from their regular ...the system, so it is ...

10

Node configuration for the Aho-Corasick algorithm in intrusion detection systems

Node configuration for the Aho-Corasick algorithm in intrusion detection systems

... Introduction Network intrusions pose a significant threat to network ...An intrusion detection system (IDS) automates the intrusion detection process by monitoring the ...

3

Intrusion Detection from Heterogenous Sensors

Intrusion Detection from Heterogenous Sensors

... target system behaviors to figure out whether an attack was ...operating system and applications) as the context ...problems: system administrators should spend a long time to investigate them, and ...

181

Scalable High-Performance Parallel Design for Network Intrusion Detection Systems on Many-Core Processors

Scalable High-Performance Parallel Design for Network Intrusion Detection Systems on Many-Core Processors

... In order to keep the parallel system busy and avoid pipeline stalls, the MSG pool must contain thousands of MSG data structures. But protecting the whole MSG pool with a single lock would result in coarse-grained ...

10

Sequence Covering for Efficient Host-Based Intrusion Detection

Sequence Covering for Efficient Host-Based Intrusion Detection

... anomaly detection in sequential data [10] while focusing on intrusion detection in cyber- physical ...systems. Intrusion [11] refers to possible security breaches in (cyber-)systems, namely ...

15

Large-scale nonlinear dimensionality reduction for network intrusion detection

Large-scale nonlinear dimensionality reduction for network intrusion detection

... 1 Introduction With internet now being ubiquitous in many aspects of daily life, keeping the networks secure has become critical and requires continuous effort [15]. In this context, an Intrusion Detection ...

7

ONTIC: D5.4: Use Case #1 Network Intrusion Detection

ONTIC: D5.4: Use Case #1 Network Intrusion Detection

... The system developed in UC #1 is practically needed by network administrators; they require a tool able to display traffic monitoring results, as well as able to detect anomalies, the strongest need being ...

71

Risk monitoring with intrusion detection for industrial control systems

Risk monitoring with intrusion detection for industrial control systems

... entire system. However, when monitoring the risk of an entire system, the related risk analysis will be large and ...widespread network of in- terconnected ...

177

Anomaly-based network intrusion detection using machine learning

Anomaly-based network intrusion detection using machine learning

... Operating System (OS) security, hardware virtualization, and network surveillance ...own network for data acquisition, alerts feedbacks, and administration (preferably several ...

123

Y-means: A Clustering Method for Intrusion Detection

Y-means: A Clustering Method for Intrusion Detection

... Clustering; intrusion detection; K-means; outlier. 1. INTRODUCTION Intrusion is defined as “the act of wrongfully entering upon, seizing, or taking possession of the property of an- other” by the ...

6

Show all 10000 documents...

Sujets connexes