• Aucun résultat trouvé

[PDF] Top 20 An intrusion detection system on network security for web application

Has 10000 "An intrusion detection system on network security for web application" found on our website. Below are the top 20 most common "An intrusion detection system on network security for web application".

An intrusion detection system on network security for web application

An intrusion detection system on network security for web application

... As the illustration in Figure 3-1 , Analysis Engine retrieves configuration and profile information from database for intrusion analysis, and Response Module saves ma[r] ... Voir le document complet

100

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

... method for domain knowledge representation and ...the intrusion de- tection features giving the ability to share a common conceptual understanding threats and design the signature rules [1, 7, 10, 13, ... Voir le document complet

13

Anomaly-based network intrusion detection using machine learning

Anomaly-based network intrusion detection using machine learning

... protection, an IDS becomes itself an excellent target to ...This security problem is related to the choice of a centralized or a distributed architecture: a centralized IDS would mean a single point ... Voir le document complet

123

ONTIC: D5.4: Use Case #1 Network Intrusion Detection

ONTIC: D5.4: Use Case #1 Network Intrusion Detection

... The system developed in UC #1 is practically needed by network administrators; they require a tool able to display traffic monitoring results, as well as able to detect anomalies, the strongest need being ... Voir le document complet

71

Scalable High-Performance Parallel Design for Network Intrusion Detection Systems on Many-Core Processors

Scalable High-Performance Parallel Design for Network Intrusion Detection Systems on Many-Core Processors

... parallel system busy and avoid pipeline stalls, the MSG pool must contain thousands of MSG data ...provides an alternative solution to avoid this coarse-grain ...allocate an MSG data structure ... Voir le document complet

10

Growing hierarchical self-organizing map for alarm filtering in network intrusion detection systems

Growing hierarchical self-organizing map for alarm filtering in network intrusion detection systems

... barrier for intrusion detection tools to cross before their deployment can be ...date, security experts, are struggling with an inherent conflict and are sometimes forced to write less ... Voir le document complet

7

Asynchronous intrusion recovery for interconnected web services

Asynchronous intrusion recovery for interconnected web services

... in an interconnected system is di fficult, because an adversary that gains access to one part of the system may propagate to many others, and tracking down and recovering from such an ... Voir le document complet

16

Self-adaptive web intrusion detection system

Self-adaptive web intrusion detection system

... the intrusion signatures on-line. Bojanic et al. [3] propose to use HMM for intrusion detection in system com- mand ...to an intrusion then the HMMs linked to normal ... Voir le document complet

28

Y-means: A Clustering Method for Intrusion Detection

Y-means: A Clustering Method for Intrusion Detection

... Clustering; intrusion detection; K-means; outlier. 1. INTRODUCTION Intrusion is defined as “the act of wrongfully entering upon, seizing, or taking possession of the property of an- other” by ... Voir le document complet

6

Security Types for Dynamic Web Data

Security Types for Dynamic Web Data

... type system for the X dπ calculus [9]. An Xdπ-network is a network of locations, where each location consists of both a data tree and of a run- ning process, for modelling ... Voir le document complet

28

Network intrusion detection system for drone fleet using both spectral analysis and robust controller / observer

Network intrusion detection system for drone fleet using both spectral analysis and robust controller / observer

... and security-related problems (such as Distributed Denial of Service (DDoS) attacks) are important issues for the detection of active security ...tools for anomaly detection are ... Voir le document complet

14

Intrusion Detection from Heterogenous Sensors

Intrusion Detection from Heterogenous Sensors

... control system, operating system, HIDS, antivirus, web server, and other applications), while providing a level of flexibility that would allow it to be used in the many different deployment ... Voir le document complet

181

Intrusion Detection System Based on Sensed Relay Forwarded Packets in Wireless Sensor Networks

Intrusion Detection System Based on Sensed Relay Forwarded Packets in Wireless Sensor Networks

... need for effective security ...these security concerns from the beginning of the system ...constraints, security in sensor networks poses different challenges than traditional ... Voir le document complet

73

A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks

A Hybrid Threat Detection and Security Adaptation System for Industrial Wireless Sensor Networks

... Self-Adaptive Intrusion Detection System in WSN ...the network, which may lead to ...the network. Lacoste et al. [8] propose an approach that uses context-awareness for ... Voir le document complet

7

Risk monitoring with intrusion detection for industrial control systems

Risk monitoring with intrusion detection for industrial control systems

... Intrusion detection systems (IDS) are meant to fill the gap between the ex- pected and the real security ...given system (which may be a single machine, a network, or a whole ... Voir le document complet

177

Efficient training data extraction framework for intrusion detection systems

Efficient training data extraction framework for intrusion detection systems

... Terms—Attack Detection, machine learning, Security rules, Pattern-Matching ...Each network carries data for numerous different kinds of applications, which should be inspected by ... Voir le document complet

5

Security Personalization for Internet and Web Services

Security Personalization for Internet and Web Services

... of Security Policies. Security policies have traditionally been used to specify security requirements for networks and distributed systems ( Varadharajan, ...language for specifying ... Voir le document complet

26

Security monitoring for network protocols and applications

Security monitoring for network protocols and applications

... of network traffic ...or an infected web- browser/operating system can rewrite HTTP headers that are in ...Our detection approach covers two kinds of threats: (i)-attacks in which ... Voir le document complet

130

Epigenetic algorithm for performing intrusion detection system

Epigenetic algorithm for performing intrusion detection system

... Algorithm for Framing Rules for Intrusion Detection” IJCSNS International Journal of Computer Science and Network Security, ...E.: An epigenetic mutation responsible ... Voir le document complet

6

Random Partitioning Forest for Point-Wise and Collective Anomaly Detection - Application to Network Intrusion Detection

Random Partitioning Forest for Point-Wise and Collective Anomaly Detection - Application to Network Intrusion Detection

... into an SIEM by processing collected samples of flows or packets from a probe placed on a network to provide alarms in case of unexpected ...if an online use is ...into an IDS processing ... Voir le document complet

17

Show all 10000 documents...