• No se han encontrado resultados

intrusion detection

A Multiagent Approach to Outbound Intrusion Detection

A Multiagent Approach to Outbound Intrusion Detection

... network intrusion detection systems is the amount of data they need to inspect (see section ...an intrusion detection system which could make them try to evade ...

228

A framework for implementing a Distributed Intrusion Detection System (DIDS) with interoperabilty and information analysis

A framework for implementing a Distributed Intrusion Detection System (DIDS) with interoperabilty and information analysis

... Distributed Intrusion Detection System (DIDS) [14] conventional intru- sion detection techniques are embedded inside inteligent agents that are deployed over a large ...early detection of ...

10

A sliding window based management traffic clustering algorithm for 802.11 WLAN intrusion detection

A sliding window based management traffic clustering algorithm for 802.11 WLAN intrusion detection

... identified which represent four network events: a link problem, a deauthentication DoS attack, a DoS recovery, and an MITM attack. Analysis of the choice of window size and sample interval for the MTCA is also presented. ...

11

Strengthening intrusion detection techniques through emerging patterns

Strengthening intrusion detection techniques through emerging patterns

... of intrusion detection has become extremely important within the last ...decade. Intrusion detection involves determining whether some entity has attempted to gain, or worse, it has gained ...

5

Architecture support for intrusion detection systems

Architecture support for intrusion detection systems

... Intrusion Detection Systems (IDS) have emerged as one of the most promising ways to protect systems in a network against suspicious activities. An IDS com- monly detects misuse by scanning packets for ...

150

Attack classification schema for smart city WSNs

Attack classification schema for smart city WSNs

... of detection engines. On the one hand, it includes a rule-based detection engine in order to detect known attacks identifiable with an attack ...popular intrusion detection techniques and the ...

24

Distributed exchange of alerts for the detection of coordinated attacks

Distributed exchange of alerts for the detection of coordinated attacks

... (Intrusion Detection Mes- sage Exchange Format) [2]—which is an IETF proposal for the exchange of information between different security components, such as Intrusion Detection Systems, and ...

8

Show all 900 documents...

Related subjects