Filters








57,834 Hits in 3.5 sec

Flow-based intrusion detection

Anna Sperotto, Aiko Pras
2011 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops  
ACKNOWLEDGMENT This research has been supported by the EC IST-EMANICS Network of Excellence (#26854) and the EU FP7-257513 UniverSelf Collaborative Project. AUTHOR'S PUBLICATION LIST  ...  INTRUSION DETECTION According to Krügel et al. [15] , "intrusion detection is the process of identifying and responding to malicious activities targeted at computing and network resources".  ...  In the following, we first introduce background on the topics of intrusion detection and flow-based intrusion detection (Sec.  ... 
doi:10.1109/inm.2011.5990529 dblp:conf/im/SperottoP11 fatcat:3taxkdmppfdfvpqr6i4t2ayjbi

Robust and scalable trust management for collaborative intrusion detection

Carol J. Fung, Jie Zhang, Issam Aib, Raouf Boutaba
2009 2009 IFIP/IEEE International Symposium on Integrated Network Management  
The accuracy of detecting intrusions within an Intrusion Detection Network (IDN) depends on the efficiency of collaboration between the peer Intrusion Detection Systems (IDSes) as well as the security  ...  The experimental results demonstrate the improved robustness, efficiency, and scalability of our system in detecting intrusions in comparison with existing models.  ...  ACKNOWLEDGMENT The authors would like to thank Quanyan Zhu for his participation in the discussion on the trust model formulation and his contribution to the editing of this paper.  ... 
doi:10.1109/inm.2009.5188784 dblp:conf/im/FungZAB09 fatcat:77u3sxmcafddxhytokjq3gqiai

Proactive Intrusion Detection and SNMP-Based Security Management: New Experiments and Validation [chapter]

J. B. D. Cabrera, L. Lewis, X. Qin, C. Gutiérrez, W. Lee, R. K. Mehra
2003 Integrated Network Management VIII  
In our earlier work we have proposed and developed a methodology for the early detection of Distributed Denial of Service (DDoS) attacks.  ...  In this paper, we examine the applicability of Proactive Intrusion Detection on a considerably more complex set-up, with hosts associated with three clusters, connected by routers.  ...  SUMMARY AND CONCLUSIONS The overall results demonstrated the applicability of Proactive Intrusion Detection using more realistic background traffic and sub-networking.  ... 
doi:10.1007/978-0-387-35674-7_8 fatcat:yckyl4vfrbff3ok5rr4cfzxoeq

Performance analysis in Intrusion Detection and Prevention Systems

Khalid Alsubhi, Nizar Bouabdallah, Raouf Boutaba
2011 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops  
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against a variety of attacks that can compromise the security and proper functioning of an enterprise information  ...  The results demonstrate that it is desirable to strike a balance between system security and network performance.  ...  the Korea Science and Engineering Foundation funded by the Ministry of Education, Science and Technology (Project No.  ... 
doi:10.1109/inm.2011.5990713 dblp:conf/im/AlsubhiBB11 fatcat:t6akfkxzafcwhen632z5kdgbhi

Dynamic integration of multiple data mining techniques in a knowledge discovery management system

Seppo J. Puuronen, Vagan Terziyan, Artyom Katasonov, Alexey Tsymbal, Belur V. Dasarathy
1999 Data Mining and Knowledge Discovery: Theory, Tools, and Technology  
An integration technique should solve the problem of estimation and selection of the most appropriate component classifiers for an ensemble.  ...  One of the most important directions in improvement of the data-mining and knowledge discovery methods is the integration of the multiple classification techniques based on ensembles of classifiers.  ...  INTEGRATING MULTIPLE CLASSIFIERS: RELATED WORK Integrating multiple classifiers to improve classification has been an area of much research in machine learning and neural networks.  ... 
doi:10.1117/12.339975 dblp:conf/dmkdttt/PuuronenTKT99 fatcat:tycon2hhpjeclh2xw3llx6rrti

Proactive intrusion detection and SNMP-based security management: new experiments and validation

J.B.D. Cabrera, L. Lewis, X. Qin, C. Gutierrez, W. Lee, R.K. Mehra
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.  
In our earlier work we have proposed and developed a methodology for the early detection of Distributed Denial of Service (DDoS) attacks.  ...  In this paper, we examine the applicability of Proactive Intrusion Detection on a considerably more complex set-up, with hosts associated with three clusters, connected by routers.  ...  SUMMARY AND CONCLUSIONS The overall results demonstrated the applicability of Proactive Intrusion Detection using more realistic background traffic and sub-networking.  ... 
doi:10.1109/inm.2003.1194163 fatcat:ox52w4vm3be7vlzb3lwzonp6ci

The network management design integrated with the intrusion detection system

Xin-You Zhang, Cheng-Zhong Li, Qing-Gui Hu
Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826)  
In order t o impmve the network management ability, The integration of network management with intrusion detection is an effective solution.  ...  Finally, NM-IDS, a new integrated design, in which the intrusion detection and the network management am integrated into a whole in the high layer, is put forward.  ...  and/or add the detectors to make the intrusion detection and the network management system scalable and integrated closely.  ... 
doi:10.1109/icmlc.2004.1380672 fatcat:43jew4kuffdjdegcywghqrdsnu

Towards an Integrated Intrusion Detection Monitoring in High Speed Networks

Sallay
2011 Journal of Computer Science  
Particularly, recent Distributed Intrusion Detection Systems (DIDS) schemes in High Speed Networks (HSN) have raised new serious management problems and challenges.  ...  Differentiating these two facets, leads to the design of a scalable intrusion detection management solution.  ...  ACKNOWLEDGMENT This study is a partial result of a project funded by King Abdul Aziz City for Sciences and Technologies (KACST) in the security research track.  ... 
doi:10.3844/jcssp.2011.1094.1104 fatcat:expbc6toyvb2lnuzmyl5im5dqq

Integrating Intrusion Detection and Fault Localization in Manets

Dan Sterne, David Balenson, Simon Tsang, Petros Mouchtaris, Maitreya Natu, Adarshpal Sethi
2006 MILCOM 2006  
Using detection of in-band wormhole attacks as an illustrative example, we outline how an integrated approach can better distinguish malicious network attacks from "normal" network delays and outages.  ...  In this exploratory paper, we propose that intrusion detection and fault localization techniques in MANET environments (which are commonly separate systems) should work cooperatively.  ...  INTEGRATED INTRUSION DETECTION AND FAULT LOCALIZATION There are many similarities between the tasks of intrusion detection and fault localization.  ... 
doi:10.1109/milcom.2006.302345 fatcat:jb45kizgnja5tbaopx44s5uhzi

A Novel Cloud Computing System Intrusion Detection Model Based on Modified Genetic Algorithm

Wen-zhun HUANG, Xin-xin XIE
2016 DEStech Transactions on Environment Energy and Earth Science  
Intrusion detection system as an important part of network security technology, in recent years has been rapid development, and technology already quite mature, today's mainstream IDS need to constantly  ...  In this paper, we propose novel cloud computing system intrusion detection model based on the modified genetic algorithm.  ...  The Intrusion Detection Model Deep intrusion detection system is a network security defense system important constituent, it through monitoring and analysis of network traffic, such as system audit records  ... 
doi:10.12783/dteees/seeie2016/4557 fatcat:3gidijkj2zhmfeihqmgunrosdi

Comparative Analysis: Intrusion Detection in Multi-Cloud Environment to Identify Way Forward

2021 International Journal of Advanced Trends in Computer Science and Engineering  
The problem arises when most of the existing network based intrusion detection systems are designed to deal with the known threats and attacks.  ...  On the other side, managing and integrating a multi-cloud computing environment is also highly complex.  ...  On the other side, managing and integrating a multi-cloud computing environment is also highly complex.  ... 
doi:10.30534/ijatcse/2021/1451032021 fatcat:tiqtxdmwwjeqre6muhz4yczu2i

Integrated Intrusion Detection Approach for Cloud Computing

C. Ambikavathi, S. K. Srivatsa
2016 Indian Journal of Science and Technology  
Objectives: Intrusion Detection System (IDS) models and methods are integrated for better detection of intruders and mitigation of false alarms.  ...  Intrusion specific data classification and false alarms degrades performance. This integrated model integrates both IDS models and IDS methodologies.  ...  Another integrated intrusion detection approach, called FCANN 7 is proposed based on Artificial Neural Networks (ANN) and Fuzzy Clustering (FC).  ... 
doi:10.17485/ijst/2016/v9i22/95170 fatcat:3eh655jbtragvlfqclpk2dkf2i

Data Fusion Support for Intrusion Detection and Prevention

Mohsen Beheshti, Richard A. Wasniowski
2007 Fourth International Conference on Information Technology (ITNG'07)  
Effective protecting the network against attacks remains problem in both research and the computer network managing professionals.  ...  The main problem with current intrusion detection and prevention systems is high rate of false alarms triggered off by attackers.  ...  Effective protecting the network against attacks remains problem in both research and the computer network managing professionals.  ... 
doi:10.1109/itng.2007.62 dblp:conf/itng/BeheshtiW07 fatcat:j3uxdnmwkbbf7kjpmqzbi6cwlq

Security Engine Management Of Router Based On Security Policy

Su Hyung Jo, Ki Young Kim, Sang Ho Lee
2007 Zenodo  
It controls an unauthorized router access and detects an illegal network intrusion.  ...  Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router for secure networking.  ...  Also, security engine detects and blocks a network attack by applying an intrusion detection policy. After detecting attack, security engine notifies alert manager of the attack.  ... 
doi:10.5281/zenodo.1080445 fatcat:3ptylfsyhnhihggymhs4smxmrm

Design and Analysis of Real-time Network Intrusion Detection and Prevention System using Open Source Tools

Ammad Uddin, Laiq Hasan
2016 International Journal of Computer Applications  
This paper describes the design and analysis of a network intrusion detection system (NIDS) and network intrusion prevention system (NIPS) using open source tools.  ...  Intrusion detection and prevention is one of the most important and fundamental task in an organization's computer network.  ...  The paper proposes Network security solutions including IPS, IDSS, firewall, network access control system, integrated risk management system, and VPN.  ... 
doi:10.5120/ijca2016908921 fatcat:fsoow7ndmbcnrgq6w4nrt5naaq
« Previous Showing results 1 — 15 out of 57,834 results