A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Flow-based intrusion detection
2011
12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops
ACKNOWLEDGMENT This research has been supported by the EC IST-EMANICS Network of Excellence (#26854) and the EU FP7-257513 UniverSelf Collaborative Project.
AUTHOR'S PUBLICATION LIST ...
INTRUSION DETECTION According to Krügel et al. [15] , "intrusion detection is the process of identifying and responding to malicious activities targeted at computing and network resources". ...
In the following, we first introduce background on the topics of intrusion detection and flow-based intrusion detection (Sec. ...
doi:10.1109/inm.2011.5990529
dblp:conf/im/SperottoP11
fatcat:3taxkdmppfdfvpqr6i4t2ayjbi
Robust and scalable trust management for collaborative intrusion detection
2009
2009 IFIP/IEEE International Symposium on Integrated Network Management
The accuracy of detecting intrusions within an Intrusion Detection Network (IDN) depends on the efficiency of collaboration between the peer Intrusion Detection Systems (IDSes) as well as the security ...
The experimental results demonstrate the improved robustness, efficiency, and scalability of our system in detecting intrusions in comparison with existing models. ...
ACKNOWLEDGMENT The authors would like to thank Quanyan Zhu for his participation in the discussion on the trust model formulation and his contribution to the editing of this paper. ...
doi:10.1109/inm.2009.5188784
dblp:conf/im/FungZAB09
fatcat:77u3sxmcafddxhytokjq3gqiai
Proactive Intrusion Detection and SNMP-Based Security Management: New Experiments and Validation
[chapter]
2003
Integrated Network Management VIII
In our earlier work we have proposed and developed a methodology for the early detection of Distributed Denial of Service (DDoS) attacks. ...
In this paper, we examine the applicability of Proactive Intrusion Detection on a considerably more complex set-up, with hosts associated with three clusters, connected by routers. ...
SUMMARY AND CONCLUSIONS The overall results demonstrated the applicability of Proactive Intrusion Detection using more realistic background traffic and sub-networking. ...
doi:10.1007/978-0-387-35674-7_8
fatcat:yckyl4vfrbff3ok5rr4cfzxoeq
Performance analysis in Intrusion Detection and Prevention Systems
2011
12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against a variety of attacks that can compromise the security and proper functioning of an enterprise information ...
The results demonstrate that it is desirable to strike a balance between system security and network performance. ...
the Korea Science and Engineering Foundation funded by the Ministry of Education, Science and Technology (Project No. ...
doi:10.1109/inm.2011.5990713
dblp:conf/im/AlsubhiBB11
fatcat:t6akfkxzafcwhen632z5kdgbhi
Dynamic integration of multiple data mining techniques in a knowledge discovery management system
1999
Data Mining and Knowledge Discovery: Theory, Tools, and Technology
An integration technique should solve the problem of estimation and selection of the most appropriate component classifiers for an ensemble. ...
One of the most important directions in improvement of the data-mining and knowledge discovery methods is the integration of the multiple classification techniques based on ensembles of classifiers. ...
INTEGRATING MULTIPLE CLASSIFIERS: RELATED WORK Integrating multiple classifiers to improve classification has been an area of much research in machine learning and neural networks. ...
doi:10.1117/12.339975
dblp:conf/dmkdttt/PuuronenTKT99
fatcat:tycon2hhpjeclh2xw3llx6rrti
Proactive intrusion detection and SNMP-based security management: new experiments and validation
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.
In our earlier work we have proposed and developed a methodology for the early detection of Distributed Denial of Service (DDoS) attacks. ...
In this paper, we examine the applicability of Proactive Intrusion Detection on a considerably more complex set-up, with hosts associated with three clusters, connected by routers. ...
SUMMARY AND CONCLUSIONS The overall results demonstrated the applicability of Proactive Intrusion Detection using more realistic background traffic and sub-networking. ...
doi:10.1109/inm.2003.1194163
fatcat:ox52w4vm3be7vlzb3lwzonp6ci
The network management design integrated with the intrusion detection system
Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826)
In order t o impmve the network management ability, The integration of network management with intrusion detection is an effective solution. ...
Finally, NM-IDS, a new integrated design, in which the intrusion detection and the network management am integrated into a whole in the high layer, is put forward. ...
and/or add the detectors to make the intrusion detection and the network management system scalable and integrated closely. ...
doi:10.1109/icmlc.2004.1380672
fatcat:43jew4kuffdjdegcywghqrdsnu
Towards an Integrated Intrusion Detection Monitoring in High Speed Networks
2011
Journal of Computer Science
Particularly, recent Distributed Intrusion Detection Systems (DIDS) schemes in High Speed Networks (HSN) have raised new serious management problems and challenges. ...
Differentiating these two facets, leads to the design of a scalable intrusion detection management solution. ...
ACKNOWLEDGMENT This study is a partial result of a project funded by King Abdul Aziz City for Sciences and Technologies (KACST) in the security research track. ...
doi:10.3844/jcssp.2011.1094.1104
fatcat:expbc6toyvb2lnuzmyl5im5dqq
Integrating Intrusion Detection and Fault Localization in Manets
2006
MILCOM 2006
Using detection of in-band wormhole attacks as an illustrative example, we outline how an integrated approach can better distinguish malicious network attacks from "normal" network delays and outages. ...
In this exploratory paper, we propose that intrusion detection and fault localization techniques in MANET environments (which are commonly separate systems) should work cooperatively. ...
INTEGRATED INTRUSION DETECTION AND FAULT LOCALIZATION There are many similarities between the tasks of intrusion detection and fault localization. ...
doi:10.1109/milcom.2006.302345
fatcat:jb45kizgnja5tbaopx44s5uhzi
A Novel Cloud Computing System Intrusion Detection Model Based on Modified Genetic Algorithm
2016
DEStech Transactions on Environment Energy and Earth Science
Intrusion detection system as an important part of network security technology, in recent years has been rapid development, and technology already quite mature, today's mainstream IDS need to constantly ...
In this paper, we propose novel cloud computing system intrusion detection model based on the modified genetic algorithm. ...
The Intrusion Detection Model Deep intrusion detection system is a network security defense system important constituent, it through monitoring and analysis of network traffic, such as system audit records ...
doi:10.12783/dteees/seeie2016/4557
fatcat:3gidijkj2zhmfeihqmgunrosdi
Comparative Analysis: Intrusion Detection in Multi-Cloud Environment to Identify Way Forward
2021
International Journal of Advanced Trends in Computer Science and Engineering
The problem arises when most of the existing network based intrusion detection systems are designed to deal with the known threats and attacks. ...
On the other side, managing and integrating a multi-cloud computing environment is also highly complex. ...
On the other side, managing and integrating a multi-cloud computing environment is also highly complex. ...
doi:10.30534/ijatcse/2021/1451032021
fatcat:tiqtxdmwwjeqre6muhz4yczu2i
Integrated Intrusion Detection Approach for Cloud Computing
2016
Indian Journal of Science and Technology
Objectives: Intrusion Detection System (IDS) models and methods are integrated for better detection of intruders and mitigation of false alarms. ...
Intrusion specific data classification and false alarms degrades performance. This integrated model integrates both IDS models and IDS methodologies. ...
Another integrated intrusion detection approach, called FCANN 7 is proposed based on Artificial Neural Networks (ANN) and Fuzzy Clustering (FC). ...
doi:10.17485/ijst/2016/v9i22/95170
fatcat:3eh655jbtragvlfqclpk2dkf2i
Data Fusion Support for Intrusion Detection and Prevention
2007
Fourth International Conference on Information Technology (ITNG'07)
Effective protecting the network against attacks remains problem in both research and the computer network managing professionals. ...
The main problem with current intrusion detection and prevention systems is high rate of false alarms triggered off by attackers. ...
Effective protecting the network against attacks remains problem in both research and the computer network managing professionals. ...
doi:10.1109/itng.2007.62
dblp:conf/itng/BeheshtiW07
fatcat:j3uxdnmwkbbf7kjpmqzbi6cwlq
Security Engine Management Of Router Based On Security Policy
2007
Zenodo
It controls an unauthorized router access and detects an illegal network intrusion. ...
Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking. ...
Also, security engine detects and blocks a network attack by applying an intrusion detection policy. After detecting attack, security engine notifies alert manager of the attack. ...
doi:10.5281/zenodo.1080445
fatcat:3ptylfsyhnhihggymhs4smxmrm
Design and Analysis of Real-time Network Intrusion Detection and Prevention System using Open Source Tools
2016
International Journal of Computer Applications
This paper describes the design and analysis of a network intrusion detection system (NIDS) and network intrusion prevention system (NIPS) using open source tools. ...
Intrusion detection and prevention is one of the most important and fundamental task in an organization's computer network. ...
The paper proposes Network security solutions including IPS, IDSS, firewall, network access control system, integrated risk management system, and VPN. ...
doi:10.5120/ijca2016908921
fatcat:fsoow7ndmbcnrgq6w4nrt5naaq
« Previous
Showing results 1 — 15 out of 57,834 results