19,317 Hits in 6.0 sec

Top-Down Delivery of IoT-based Applications for Seniors Behavior Change Capturing Exploiting a Model-Driven Approach

Adriana Caione, Alessandro Fiore, Luca Mainetti, Luigi Manco, Roberto Vergallo
2018 Journal of Communications Software and Systems  
In WoX, almost all the IoT entities and concepts are limited to the concept of Topic, i.e. an entity containing the value of a feature of interest that we intend to detect.  ...  Developing Internet of Things (IoT) requires expertise and considerable skills in different fields in order to cover all the involved heterogeneous technologies, communication formats and protocols.  ...  A LEA is the finest grain atomic information used to detect behavior of elderly people.  ... 
doi:10.24138/jcomss.v14i1.438 fatcat:cd7gexlcebfhbk6z6wdozefbmq

Using Failure Information Analysis to Detect Enterprise Zombies [chapter]

Zhaosheng Zhu, Vinod Yegneswaran, Yan Chen
2009 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
We propose failure information analysis as a novel strategy for uncovering malware activity and other anomalies in enterprise network traffic.  ...  The system uses an SVM-based classification engine to identify suspicious systems and clustering to aggregate failure activity of related enterprise hosts.  ...  Our approach: In this paper, we introduce a new behavior-based approach to detect infected hosts within an enterprise network.  ... 
doi:10.1007/978-3-642-05284-2_11 fatcat:2klhpaekdbftvgjrqrl4rwnmte

Real Time Detection Framework of Insider Threat Based Agent

Zhen-hui WANG
2018 DEStech Transactions on Computer Science and Engineering  
In view of the increasing internal threat behavior of enterprise information system, especially the internal user data corruption.  ...  A real time detection framework based on agent is proposed, and malicious insider threats are identified by comparing user identity and abnormal operation behavior.  ...  The principal task of the detection module is to use the internal threat detection rules and knowledge base to compare and analyze the user behavior data, output the system alarm and suspicious event information  ... 
doi:10.12783/dtcse/cmee2017/20071 fatcat:3uhik3kiozfu7kj654voeeyhgy

An architecture of a distributed intrusion detection system using cooperating agents

Jaydip Sen, Indranil Sengupta, Piyali Roy Chowdhury
2006 2006 International Conference on Computing & Informatics  
The results show the effectiveness of our system in detecting intrusive activities in any network of workstations.  ...  An Intrusion Detection System (IDS) is a security mechanism that is expected to monitor and detect intrusions into the computer systems in real time.  ...  in getting data only from local host, local domain, or the entire enterprise network.  ... 
doi:10.1109/icoci.2006.5276474 fatcat:hy455mnxcrbs5oq44dcyenwny4

Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention

K. Alsubhi, I. Aib, J. Francois, R. Boutaba
2009 2009 IEEE International Conference on Communications  
IDPSes can be network or host-based and can collaborate in order to provide better detections of malicious traffic.  ...  of an enterprise information system.  ...  IDPSes can be network or host-based and can collaborate into centralized or distributed clusters in order to provide better detections of malicious traffic across a distributed networked system.  ... 
doi:10.1109/icc.2009.5199341 dblp:conf/icc/AlsubhiAFB09 fatcat:7abcmrhcwve6vc7nq5gholxe5a

Intrusion Detection System Based on Data Mining Techniques

Abhinav Kumra, W Jeberson, Klinsega Jeberson
2017 Oriental journal of computer science and technology  
Network security is one of the most important non-functional requirements in a system. Over the years, many software solutions have been developed to enhance network security.  ...  The need for IDS in a system environment and the generic blocks in IDS is also mentioned.The examples are as follows: (1) Misuse intrusion detection system that uses state transition analysis approach,  ...  Application Applications of intrusion detection by data mining are as follows: The goal of intrusion detection is to detect • security violations in information systems.  ... 
doi:10.13005/ojcst/10.02.33 fatcat:amrrr4lsdjf4pmokd4hrsh2mgq

Network Threat Behavior Detection and Trend Analysis Based on the TDLC Model

Dong Ma
2013 The Smart Computing Review  
In this paper, we present a network detection method based on a collaborative model against network threats and attacks, as well as trend analysis of network structure.  ...  Therefore, network intrusion detection becomes a great challenge to security in both industry and academics.  ...  Here are the services involved in the assessment model: concepts of risk, index of hosts and network, and its corresponding calculation.  ... 
doi:10.6029/smartcr.2013.04.007 fatcat:7hrjtevb65gybcpfdsablho5qa

Decrypting SSL/TLS traffic for hidden threats detection [article]

Tamara Radivilova and Lyudmyla Kirichenko and Dmytro Ageyev and Maxim Tawalbeh and Vitalii Bulakh
2019 arXiv   pre-print
The developed approach has been automated and can be used for remote listening of the network, which will allow to decrypt transmitted data in a mode close to real time.  ...  Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered.  ...  It is widely distributed in enterprises and is growing rapidly due to the rapid increase in mobile, cloud and web applications.  ... 
arXiv:1904.08383v1 fatcat:rmqukojpw5bxvoqcxfovu6dmbe

Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research [article]

Md. Monowar Anjum, Shahrear Iqbal, Benoit Hamelin
2021 arXiv   pre-print
Maintaining security and privacy in real-world enterprise networks is becoming more and more challenging.  ...  To develop novel and effective methods to thwart these sophisticated cyberattacks, we need datasets that reflect real-world enterprise scenarios to a high degree of accuracy.  ...  Provenance-based approaches provide a robust representation of network events that offer insights into the collective network behavior, at the cost of some detection sensitivity compared to NN approaches  ... 
arXiv:2103.03080v2 fatcat:wg6fdmvf6nh4bhz7wlw5bel5oa

Towards a taxonomy of intrusion-detection systems

Hervé Debar, Marc Dacier, Andreas Wespi
1999 Computer Networks  
bstract Intrusion-detection systems aim at detecting attacks against computer systems and networks, or against information systems in general, as it is difficult to provide provably secure information  ...  They detect attempts and active misuse by legitimate users of the information systems or external parties to abuse their privileges or exploit security vulnerabilities.  ...  Host-based Õersus network-based intrusion detection Host-based intrusion detection is the first area to have been explored in intrusion detection.  ... 
doi:10.1016/s1389-1286(98)00017-6 fatcat:upa4opx5x5anton56jpls35jqy

An Intrusion Detection Technique Based on Discrete Binary Communication Channels [chapter]

Ampah, N. K., Akujuobi, C. M., Annamalai A.
2011 Intrusion Detection Systems  
Depending on where the IDS software is installed, it can be referred to as network based intrusion detection system (NIDS) or host based intrusion detection system (HIDS).  ...  This system provides a comprehensive overall assessment of a network, which leads to building broader immunities to help maintain the health of any enterprise network.  ...  An Intrusion Detection Technique Based on Discrete Binary Communication Channels, Intrusion Detection Systems, Dr.  ... 
doi:10.5772/14456 fatcat:srta7ysh6nd63kfxkiwmv4rqaa

Lightweight agents for intrusion detection

Guy Helmer, Johnny S.K. Wong, Vasant Honavar, Les Miller, Yanxin Wang
2003 Journal of Systems and Software  
Our agents travel between monitored systems in a network of distributed systems, obtain information from data cleaning agents, classify and correlate information, and report the information to a user interface  ...  We have designed and implemented an intrusion detection system (IDS) prototype based on mobile agents.  ...  research articles in refereed journals, conferences and books, and has co-edited three books. He is a co-editor-in-chief of the Journal of Cognitive Systems Research published by Elsevier.  ... 
doi:10.1016/s0164-1212(02)00092-4 fatcat:syjfwhvlzze4bgvjlyuiuq2hwm

Toward A Network-Assisted Approach for Effective Ransomware Detection [article]

Tianrou Xia, Yuanyi Sun, Sencun Zhu, Zeeshan Rasheed, Khurram Shafique
2020 arXiv   pre-print
The experiment results show that our network-level detection mechanisms are separately applicable to WAN and LAN environments for ransomware detection.  ...  In this work, we propose Network-Assisted Approach (NAA), which contains effective local detection and network-level detection mechanisms, to help users determine whether a machine has been infected by  ...  Based on such given information, the user can make a judgement about whether this local host is in danger.  ... 
arXiv:2008.12428v2 fatcat:ynzz4ig75jf5jie7kscvougdrq

Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing [chapter]

Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, Joaquim Celestino Júnior
2012 Lecture Notes in Computer Science  
The traditional Intrusion Detection and Prevention Systems (IDPS) are deemed largely inefficient to be deployed in cloud computing environments due to their openness, dynamicity and virtualization in offered  ...  This paper surveys and explores the possible solutions to detect and prevent intrusions in cloud computing systems by providing a comprehensive taxonomy of existing IDPS.  ...  Host-based (HIDPS) monitors the dynamic behavior and the state of a computer system.  ... 
doi:10.1007/978-3-642-35362-8_33 fatcat:tmq6ndhbojblfdym6g6lsln5ta

An Agent-Based Intrusion Detection System for Local Area Networks [article]

Jaydip Sen
2010 arXiv   pre-print
In addition to its ability to detect attacks, the system is capable of identifying and isolating compromised nodes in the network thereby introducing fault-tolerance in its operations.  ...  (IDSs) are essential entities to ensure the security of a networked system.  ...  Zeng and Guo have proposed an agent-based IDS that can be integrated into the applications of enterprise information systems [24] .  ... 
arXiv:1011.1531v1 fatcat:y66vnnz4pzcyjog3rpuhwi4bsy
« Previous Showing results 1 — 15 out of 19,317 results