• Aucun résultat trouvé

Network intrusion detection systems

Growing hierarchical self-organizing map for alarm filtering in network intrusion detection systems

Growing hierarchical self-organizing map for alarm filtering in network intrusion detection systems

... handling intrusion detection alarms more efficiently. Neural Network analyses based on the self-organizing map (SOM) and the growing hierarchical self-organizing map (GHSOM) are used to discover ...

7

Intrusion detection in network systems through hybrid supervised and unsupervised mining process
- a detailed case study on the ISCX benchmark dataset -

Intrusion detection in network systems through hybrid supervised and unsupervised mining process - a detailed case study on the ISCX benchmark dataset -

... The SVM is one of the most successful classification algorithms in the field of data mining, but the training task is time-consuming (computationally expensive) for intrusion detection systems which ...

16

Scalable High-Performance Parallel Design for Network Intrusion Detection Systems on Many-Core Processors

Scalable High-Performance Parallel Design for Network Intrusion Detection Systems on Many-Core Processors

... on-chip network [12, 16](see ...five Network-on-Chip (NoC) interconnects, only one, the User Dynamic Network (UD- N), is dedicated to the applications for communication a- mong tiles, while the ...

10

Node configuration for the Aho-Corasick algorithm in intrusion detection systems

Node configuration for the Aho-Corasick algorithm in intrusion detection systems

... Introduction Network intrusions pose a significant threat to network ...An intrusion detection system (IDS) automates the intrusion detection process by monitoring the packets ...

3

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach

RadIoT: Radio Communications Intrusion Detection for IoT - A Protocol Independent Approach

... their network-accessible ...or network intrusion detection systems (IDS) usually rely on a central device, such as a gateway or a proxy, to analyze the network communications, in ...

9

Efficient training data extraction framework for intrusion detection systems

Efficient training data extraction framework for intrusion detection systems

... Terms—Attack Detection, machine learning, Security rules, Pattern-Matching ...Each network carries data for numerous different kinds of applications, which should be inspected by security settings in order ...

5

Risk monitoring with intrusion detection for industrial control systems

Risk monitoring with intrusion detection for industrial control systems

... 2.4. Conclusion 29 2.4 Conclusion Risk monitoring is not a new concept. A decent amount of research has been invested in the design and development of real-time risk analyses, especially in the realm of industrial ...

177

Network intrusion detection system for drone fleet using both spectral analysis and robust controller / observer

Network intrusion detection system for drone fleet using both spectral analysis and robust controller / observer

... improve intrusion detection systems in the specific context of drone ...of intrusion is performed in the ...the intrusion detection process proposed in Section 3 and validated in ...

14

Towards privacy preserving cooperative cloud based intrusion detection systems

Towards privacy preserving cooperative cloud based intrusion detection systems

... network. Besides, it is difficult to identify the appropriate types of microdata that need to be anonymized. Microdata anonymization works in such a way that it is quantifiable and difficult to infer potentially ...

88

Intrusion Detection from Heterogenous Sensors

Intrusion Detection from Heterogenous Sensors

... FRAMEWORK Intrusion detection and alert correlation systems play a key role in the surveillance and monitoring of computer network ...these systems are increasingly important in any ...

181

Random Partitioning Forest for Point-Wise and Collective Anomaly Detection - Application to Network Intrusion Detection

Random Partitioning Forest for Point-Wise and Collective Anomaly Detection - Application to Network Intrusion Detection

... anomaly detection, reconstruction error is the criterion used to decide whether a data item is normal or deviates too much from ...anomaly detection for intrusion detection on network ...

17

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

... Consequently, Intrusion Detection Systems (IDS) are quickly becoming a popular requirement in building a network se- curity ...other systems over real traffic and a set of simulated ...

13

Theoretical and Applied Foundations for Intrusion Detection in Single and Federated Clouds

Theoretical and Applied Foundations for Intrusion Detection in Single and Federated Clouds

... test network is completely disconnected from the network of our institution as well as from the Internet to avoid the leakage of the DoS ...The detection algorithm (Algorithm 2) is implemented in ...

191

Intrusion Detection System Based on Sensed Relay Forwarded Packets in Wireless Sensor Networks

Intrusion Detection System Based on Sensed Relay Forwarded Packets in Wireless Sensor Networks

... traditional network security. We were interested in this work in intrusion detection systems (IDSs) as a means of protecting the ...the network is an attacker or ...the network ...

73

Sequence Covering for Efficient Host-Based Intrusion Detection

Sequence Covering for Efficient Host-Based Intrusion Detection

... anomaly detection in sequential data [10] while focusing on intrusion detection in cyber- physical ...systems. Intrusion [11] refers to possible security breaches in ...

15

Performance analysis of wireless intrusion detection systems

Performance analysis of wireless intrusion detection systems

... communications systems invulnerable to ...wireless network security that is considered the most critical challenge in this ...the network security concepts; vulnerabilities, threats, threat sources, ...

169

Anomaly-based network intrusion detection using machine learning

Anomaly-based network intrusion detection using machine learning

... • Integrity is defined by the ISO 27000 standard as the “property of accuracy and completeness” [10]. Integrity ensures that information is protected from being modified by unauthorized parties, or accidentally by ...

123

Impact of IT Monoculture on Behavioral End Host Intrusion Detection

Impact of IT Monoculture on Behavioral End Host Intrusion Detection

... Capability-based systems allow a receiver to explicitly authorize the traffic it is willing to receive, and filter-based schemes enable a receiver to install network filters to block unwanted ...HID ...

10

Low-Rate False Alarm Anomaly-Based Intrusion Detection System with One-Class SVM

Low-Rate False Alarm Anomaly-Based Intrusion Detection System with One-Class SVM

... an intrusion into the systems, and they produce extra work for the ...of intrusion detection systems with the ability to distinguish attacks from non-attack observations to secure ...

100

SIGDERS Air Intrusion Measurements on Mechanically Attached Roofing Systems

SIGDERS Air Intrusion Measurements on Mechanically Attached Roofing Systems

... air intrusion of roofing systems with multilayer insulation arrangements ...air intrusion in Mechanically Attached Roofing Systems (MARS), a new test laboratory Dynamic Roofing Facility – Air ...

119

Show all 10000 documents...

Sujets connexes