Filters








683 Hits in 6.2 sec

Two-Level Packet Inspection Using Sequential Differentiate Method

N. Kannaiya Raja, K. Arulanandam, B. Raja Rajeswari
2012 2012 International Conference on Advances in Computing and Communications  
Patterns based detectors used in Packet Inspection implement multi-pattern matching algorithms to check whether the packet payload have a specified patterns in a patterns set.  ...  Deep Packet Inspection is a vital task in network security applications such as Firewalls and Intrusion Detection Systems (IDS).  ...  Two-Level Intrusion Detection System In this section, a two-level intrusion detection system is proposed to detect various abnormal payload size .  ... 
doi:10.1109/icacc.2012.10 fatcat:344vef253rfqjiuhudsjhl4fjy

A Study on the Integrated Security System based Real-time Network Packet Deep Inspection

Chang-Su Moon, Sun-Hyung Kim
2014 International Journal of Security and Its Applications  
The security system against external attacks that use various security vulnerabilities consists of firewall and intrusion detection and prevention subsystem, and its functionality is becoming more advanced  ...  This paper proposes a network packet indepth test-based, integrated security system that analyzes the threat factors through a total study of network packets circulated in realtime and applies various  ...  Such monitoring of packets is widely applied in traditional security systems and network analysis system such as IDS(Intrusion Detection System) and IPS(Intrusion Prevention System).  ... 
doi:10.14257/ijsia.2014.8.1.11 fatcat:3q3uarlnwrbhrldqtht2jckm5m

SafeCard: A Gigabit IPS on the Network Card [chapter]

Willem de Bruijn, Asia Slowinska, Kees van Reeuwijk, Tomas Hruby, Li Xu, Herbert Bos
2006 Lecture Notes in Computer Science  
Current intrusion detection systems have a narrow scope.  ...  We argue that network-based intrusion detection systems should consider all levels of abstraction in communication (packets, streams, layer-7 data units, and aggregates) if they are to handle gigabit link  ...  Acknowledgements We would like to thank Lennert Buytenhek for his invaluable help during development of the IXP2400 code and installation of the testbed.  ... 
doi:10.1007/11856214_16 fatcat:nwybudp5m5dsfpjehaxc653y6i

Snort-based Smart and Swift Intrusion Detection System

Rashidah Funke Olanrewaju, Burhan Ul Islam Khan, Athaur Rahman Najeeb, Ku Nor Afiza Ku Zahir, Sabahat Hussain
2018 Indian Journal of Science and Technology  
neural network is used for intrusion detection.  ...  Objectives: In this paper, a smart Intrusion Detection System (IDS) has been proposed that detects network attacks in less time after monitoring incoming traffic thus maintaining better performance.  ...  Intrusion Detection System (IDS) is a component of a computer network system acting as an alarm.  ... 
doi:10.17485/ijst/2018/v11i4/120917 fatcat:pfre2lx7afa33or3zvmesz5psm

High-performance Architecture of Network Intrusion Prevention Systems

Zhao Yueai, Hou Pengcheng, Wang Ling, Han Suqing
2014 EAI Endorsed Transactions on Scalable Information Systems  
A set of network-based anomaly Intrusion Detection sensors is used in processing network traffic.  ...  Software-based Network Intrusion Prevention Systems have difficulty in handling high speed links.  ...  Konstantinos Xinidis describes the design and implementation of a highperformance Network Intrusion Prevention System that combines the use of software-based Network Intrusion Prevention sensors and an  ... 
doi:10.4108/sis.1.3.e3 fatcat:wdxpm6z44ndgzb3vmslunq25b4

A Prototype for Network Intrusion Detection System using Danger Theory

Raed Al-Dhubhani, Norbik Bashah Idris, Faisal Saeed
2015 Jurnal Teknologi  
Misuse-based intrusion detection builds a database of the well-defined patterns of the attacks that exploit weaknesses in systems and network protocols, and uses that database to identify the intrusions  ...  Network Intrusion Detection System (NIDS) is considered as one of the last defense mechanisms for any organization.  ...  Misuse-based Detection In this approach, the well-defined patterns of the attacks that exploit weaknesses in system and application software are used to identify the intrusions [5] .  ... 
doi:10.11113/jt.v73.4196 fatcat:njkaiqikczfmrgnxh4zbr3kiny

Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network [article]

Shiyi Yang, Hui Guo, Nour Moustafa
2021 arXiv   pre-print
Machine learning (ML)-based intrusion detection systems (IDSs) play a critical role in discovering unknown threats in a large-scale cyberspace.  ...  It uses a deep ensemble network (trained through supervised learning) to detect anomalous network activities and exploits an unsupervised learning-based scheme to trim off mis-detection results.  ...  Rule-Based Pattern Matching Intrusion Detection System A rule-based IDS discovers threats by matching attack signatures or patterns against a pre-defined blacklist, which is effective to identify known  ... 
arXiv:2105.09157v4 fatcat:zkcteve4l5ezhfg5xetq5nku2y

A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems

Ilkyu Kim, Doohwan Oh, Myung Yoon, Kyueun Yi, Won Ro
2013 Sensors  
To address this problem, we develop a novel distributed network intrusion detection system based on the Wu-Manber algorithm.  ...  Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources.  ...  The algorithm is used for finding words in a web page or a textbook, DNA pattern recognition, and network intrusion detection.  ... 
doi:10.3390/s130403998 pmid:23529146 pmcid:PMC3673066 fatcat:qlwc7yljb5gltcs2q25xiw56ge

Network intrusion detection using hardware techniques: A review

Razan Abdulhammed, Miad Faezipour, Khaled M. Elleithy
2016 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT)  
This paper reviews and compares hardware based techniques that are commonly used in intrusion detection systems with a special emphasis on modern hardware platforms such as FPGA, GPU, many-core processors  ...  The increasing amount of network throughput and security threat makes intrusion detection a major research problem.  ...  HARDWARE-BASED INTRUSION DETECTION SYSTEMS A hardware-based intrusion detection system is a scalable method as it is able to inspect packets in high speed networks.  ... 
doi:10.1109/lisat.2016.7494100 fatcat:z2a5na5margvvhybu7qpy4yaqm

Intrusion Detection System based on Fuzzy C Means Clusteringand Probabilistic Neural Network

Rachna kulhare, Divakar Singh
2013 International Journal of Computer Applications  
This paper presents an intrusion detection system based on fuzzy C-means clustering and probabilistic neural network which not only reduces the training time but also increases the detection accuracy.  ...  Since the network is closely related to operating its conditions hence a careful observation & analysis of network characteristics could describe the state of the network such as network is under specific  ...  The BN is used to build automatic intrusion detection system based on signature recognition.  ... 
doi:10.5120/12860-9725 fatcat:e3onrdfafzepvj4dzalgt3zzyu

Self-Organising Maps in Computer Security [article]

Jan Feyereisl, Uwe Aickelin
2016 arXiv   pre-print
detection, analysis of executables all the way to wireless network monitoring.  ...  In this chapter a review of security related SOM research undertaken in the past is presented and analysed.  ...  Network Based Systems As mentioned earlier, the majority of research done using the SOM algorithm has been based on network intrusion detection.  ... 
arXiv:1608.01668v1 fatcat:ltz4fa4jhfbzvdymt3vpqbaofa

Novel Traffic Measurement Methodology for High Precision Applications Awareness in Multi-gigabit Networks [chapter]

Taesang Choi, Sangsik Yoon, Dongwon Kang, Sangwan Kim, Joonkyung Lee, Kyeongho Lee
2006 Lecture Notes in Computer Science  
Especially, most recent research has tried to address limitations of simple flow-based monitoring by utilizing payload inspection for applications signatures or by identifying target application group  ...  Traffic measurement research has focused on various aspects ranging from simple packet-based monitoring to sophisticated flow-based measurement and analysis.  ...  -Type-PI (Payload Inspection-based Recognition Type): Recognition is performed on the basis of both port numbers and signatures, a.k.a. patterns, in the application PDU (Payload Data Unit).  ... 
doi:10.1007/11876601_7 fatcat:tcedjmynnzawxk72rmfsdesccq

Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection [chapter]

John W. Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks
2004 Lecture Notes in Computer Science  
It uses the Field-programmable Port Extender (FPX) to scan for signatures of malicious software (malware) carried in packet payloads.  ...  A platform has been implemented that actively detects and blocks worms and viruses at multi-Gigabit/second rates.  ...  New methods of detecting outbreaks can streamline the recognition and analysis of new threats and shorten the time needed to obtain a new signature.  ... 
doi:10.1007/978-3-540-24715-9_5 fatcat:rkttexnox5aa3bmtfxv5a3lnwe

Design and performance evaluation of an adaptive FPGA for network applications

Christoforos Kachris, Stephan Wong, Stamatis Vassiliadis
2009 Microelectronics Journal  
The platform consists of two MicroBlaze RISC processors and a number of hardware co-processors used for the processing of packet payloads (Data Encryption Standard (DES) and Lempel-Ziv Compression).  ...  The co-processors can be connected either directly to the processors or using a shared bus.  ...  The system has been evaluated in three applications: tree lookup, pattern matching, and network intrusion detection. In [24] , the PLATO platform is presented.  ... 
doi:10.1016/j.mejo.2008.05.011 fatcat:ntr36rxsmjegdaqb2lson3ouy4

The Evaluation of Capabilities of Intellectual Intrusion Detection Systems for the Use in Web- Based Information Systems

Pjotrs Dorogovs, Andrejs Romanovs
2012 Information Technology and Management Science  
Such security systems roughly (for the purpose of this paper) can be divided into intrusion protection and intrusion detection systems -IPS and IDS, respectively [1].  ...  Currently, studies in the field of information security focus on the use of various intellectual data mining techniques for building an intellectual information security system.  ...  be used for a real intrusion detection, it can be concluded that the construction of proper rules of normal behaviour of the system is a key factor for a network intrusion detection system.  ... 
doi:10.2478/v10313-012-0020-9 fatcat:xasgak3lmfgqvfgl3gvphyitly
« Previous Showing results 1 — 15 out of 683 results