• Aucun résultat trouvé

[PDF] Top 20 Self-adaptive web intrusion detection system

Has 10000 "Self-adaptive web intrusion detection system" found on our website. Below are the top 20 most common "Self-adaptive web intrusion detection system".

Self-adaptive web intrusion detection system

Self-adaptive web intrusion detection system

... the intrusion signatures ...for intrusion detection in system com- mand ...an intrusion then the HMMs linked to normal behavior are updated, else HMMs associated to intrusions are ... Voir le document complet

28

An intrusion detection system on network security for web application

An intrusion detection system on network security for web application

... As the illustration in Figure 3-1 , Analysis Engine retrieves configuration and profile information from database for intrusion analysis, and Response Module saves ma[r] ... Voir le document complet

100

Growing hierarchical self-organizing map for alarm filtering in network intrusion detection systems

Growing hierarchical self-organizing map for alarm filtering in network intrusion detection systems

... for intrusion detection tools to cross before their deployment can be ...adequate detection rules just to reduce the number of false ...the intrusion detection ...an intrusion ... Voir le document complet

7

Towards a Self-Adaptive Data Management System for Cloud Environments

Towards a Self-Adaptive Data Management System for Cloud Environments

... able web-service that allows users to store data in Amazon’s data ...of self-management mechanisms into the systems, so as to enable them to handle the dynamism and complexity of large data ... Voir le document complet

5

Efficient training data extraction framework for intrusion detection systems

Efficient training data extraction framework for intrusion detection systems

... VII. C ONCLUSION AN F UTURE W ORKS The main purpose of our work is to present a novel method for collecting real ground-truth training data for intrusion detection system. The lack of academic ... Voir le document complet

5

Intrusion Detection from Heterogenous Sensors

Intrusion Detection from Heterogenous Sensors

... FRAMEWORK Intrusion detection and alert correlation systems play a key role in the surveillance and monitoring of computer network ...correlation system that can automate some of the correlation and ... Voir le document complet

181

Risk monitoring with intrusion detection for industrial control systems

Risk monitoring with intrusion detection for industrial control systems

... security incidents and its cascade effects. An arrow A → B denotes that problems in A cause issues in B. A final, yet important case constitute cyclic dependencies. These occur if several appliances rely on each other in ... Voir le document complet

177

Distance Measures for Anomaly Intrusion Detection

Distance Measures for Anomaly Intrusion Detection

... for intrusion detection. Liao and Vemuri [12] developed an intrusion detection method by using the text categorization techniques based on the frequency attributes of system ...for ... Voir le document complet

10

A Self-adaptive Agent-based System for Cloud Platforms

A Self-adaptive Agent-based System for Cloud Platforms

... for self-adaptive and self- configurable CPU resource provisioning for virtualized servers using Kalman filter 1 is presented in [ 9 ...a self-adaptive Cloud monitoring approach with ... Voir le document complet

8

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

A Multi-agents Intrusion Detection System Using Ontology and Clustering Techniques

... the intrusion de- tection features giving the ability to share a common conceptual understanding threats and design the signature rules [1, 7, 10, 13, ...(Ontology Web Language) within the intrusion ... Voir le document complet

13

Bringing Introspection into BlobSeer: Towards a Self-Adaptive Distributed Data Management System

Bringing Introspection into BlobSeer: Towards a Self-Adaptive Distributed Data Management System

... data-management system for large-scale distributed ...distributed system for storing massive ...a self-configuration component aiming to provide storage elasticity by dynamically scaling the number ... Voir le document complet

15

Sequence Covering for Efficient Host-Based Intrusion Detection

Sequence Covering for Efficient Host-Based Intrusion Detection

... anomaly detection in sequential data [10] while focusing on intrusion detection in cyber- physical ...systems. Intrusion [11] refers to possible security breaches in (cyber-)systems, namely ... Voir le document complet

15

ONTIC: D5.4: Use Case #1 Network Intrusion Detection

ONTIC: D5.4: Use Case #1 Network Intrusion Detection

... The detection of new unknown anomalies (called 0d anomalies) in this changing environment is essential, and an objective of the ONTIC ...the detection phase, which in turn requires labelled traffic traces, ... Voir le document complet

71

Y-means: A Clustering Method for Intrusion Detection

Y-means: A Clustering Method for Intrusion Detection

... 4. CONCLUSION In this paper, we proposed a K-means based clustering al- gorithm, named Y-means, for intrusion detection. Y-means overcomes two shortcomings of K-means: number of clus- ters dependency and ... Voir le document complet

6

Anomaly-based network intrusion detection using machine learning

Anomaly-based network intrusion detection using machine learning

... Network Intrusion Detection Using Machine Learning Keywords : Intrusion detection, machine learning, neural networks, cyber security, unsupervised learning Abstract : In recent years, hacking ... Voir le document complet

123

An Unsupervised Clustering Algorithm for Intrusion Detection

An Unsupervised Clustering Algorithm for Intrusion Detection

... site Web et l’utilisation de son contenu sont assujettis aux conditions présentées dans le site LISEZ CES CONDITIONS ATTENTIVEMENT AVANT D’UTILISER CE SITE ... Voir le document complet

4

Multi-satellite mission planning using a self-adaptive multi-agent system

Multi-satellite mission planning using a self-adaptive multi-agent system

... (2015) In: SASO (IEEE 9th International Conference on Self-Adaptive and Self-Organizing Systems), 21 September 2015 - 25 September 2015 (Cambridge, United States). Any correspondence [r] ... Voir le document complet

12

Multi-satellite mission planning using a self-adaptive multi-agent system

Multi-satellite mission planning using a self-adaptive multi-agent system

... Recently, self-organizing systems such as adaptive multi- agent systems have proven valuable for solving dynamic problems, thanks to their ability to adapt themselves to their ...an adaptive ... Voir le document complet

11

Network intrusion detection system for drone fleet using both spectral analysis and robust controller / observer

Network intrusion detection system for drone fleet using both spectral analysis and robust controller / observer

... of intrusion we generate in the network, are used to select the accurate model for robust control ...or intrusion in the ...observer system has been successfully applied to some relevant practical ... Voir le document complet

14

Cache-Based Side-Channel Intrusion Detection using Hardware Performance Counters

Cache-Based Side-Channel Intrusion Detection using Hardware Performance Counters

... Proposed detection approach works for access-driven cache-based side-channel attacks on modrn processors and it uses multiple ML models for detection ...on detection accuracy, speed, system- ... Voir le document complet

3

Show all 10000 documents...