Filters








38,762 Hits in 3.3 sec

Intrusion Detection for an On-Going Attack

Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Yuh Huang
1999 International Symposium on Recent Advances in Intrusion Detection  
An intrusion-detection system (IDS) for an on-going attack is described. Prior to an attack, an IDS operates in anticipation of a general threat.  ...  Knowledge of LCDs is useful for work in attack repair, neutralization and containment.  ...  Information about these devices can also be used as a means for intrusion detection. Prior to an attack, an intrusion detection system operates in anticipation of a general threat.  ... 
dblp:conf/raid/YuillWGH99 fatcat:3z5j6p6qnfegfbb7tahh6ke7fm

Network Intrusion Detection using Layered Approach and Hidden Markov Model

Archana I.Patil, Girish Kumar Patnaik, Ashish T. Bhole
2014 International Journal of Computer Applications  
Signature based intrusion detection system detects known attacks timely and efficiently. For this approach, it is important to know the attack.  ...  In anomaly based intrusion detection, the strategy is to suspect an unusual activity and thereby to continue further investigation. This approach is particularly effective against novel attacks.  ...  Perform same for HMM and WEKA tool viii] Find attack detection rate of HMM go to step no. v after finding attack detection rate goto step no. ix ix] Find attack detection rate of WEKA go to step  ... 
doi:10.5120/16278-6049 fatcat:5m7fcq5tzncaljtqxuur5aqhoy

An Intrusion Intention Analysis Algorithm Based on Attack Graph

Zhen Zhu, Guofei Chai
2021 North atlantic university union: International Journal of Circuits, Systems and Signal Processing  
To detect intrusion detections, this paper presents a domain-device attack graph, and collects and analyzes the underlying data of the network topology.  ...  On this basis, the attack graph Map was quantified by the Bayesian theory.  ...  Drawing on the previous results [10] , the research team presented an automatic analysis, detection, and response method for intrusion intentions based on domain-device attack graph.  ... 
doi:10.46300/9106.2021.15.71 fatcat:jchw56pg4raideqpwegztshkxu

Autoencoder – Support Vector Machine – Grasshopper Optimization for Intrusion Detection System

2022 International Journal of Intelligent Engineering and Systems  
An intrusion detection system monitors the networks and identifies the malware or suspicious activity in the network.  ...  The hybrid technique of AE-SVM-GO is applied to solve imbalance data problem and overfitting problem in intrusion detection.  ...  The GO-SVM and autoencoder model for intrusion detection are shown in Fig. 1 .  ... 
doi:10.22266/ijies2022.0831.36 fatcat:3ch4ghlsvfddnja35ezhgfv7iq

Intrusion Detection and Prevention System: Issues and Challenges

Bilal MaqboolBeigh, Uzair Bashir, Manzoor Chahcoo
2013 International Journal of Computer Applications  
In this paper we made a survey on the overall progress of intrusion detection systems. We survey the existing types, techniques and architectures of Intrusion Detection Systems in the literature.  ...  Since many different mechanisms were opted by organizations in the form of intrusion detection and prevention system to protect its organizations for these kinds of attacks, still there are many security  ...  Thus it became very much important for an organization to install both firewall and intrusion detection system to secure their assets / information for hackers / attackers.  ... 
doi:10.5120/13340-0701 fatcat:ebdcx6idifcwtfri6ff3fvhega

Long Short-Term Memory (LSTM) Deep Learning Method for Intrusion Detection in Network Security

Supriya Shende, Government College of Engineering, Amravati
2020 International Journal of Engineering Research and  
Deep learning algorithm techniques is an advanced method for detect intrusion in network.  ...  Nowadays, large numbers of people were affected by data infringes and cyber-attacks due to dependency on internet. India is lager country for any resource use or consumer.  ...  For illegal right to use or information from network, intruder made an intrusion in system. An intrusion is nothing but attack, hacking, packet sniffing or stilling of data.  ... 
doi:10.17577/ijertv9is061016 fatcat:emfnxhfbebeytlxdebzuhsaeta

A Review on Intrusion Detection System and Various Attacks on Network

Govind Narayan
2018 International Journal for Research in Applied Science and Engineering Technology  
, data mining as a strategy for learning attacks and taking preventive activities when comparable sorts of attacks are experienced later on.  ...  Intrusion detection systems are frameworks that can identify any sort of vindictive attacks, corrupted information or any sort of intrusion that can posture risk to our frameworks.  ...  Intrusion Detection Systems (IDS) plays a critical part in the security of systems by identifying when an attack is going on, yet most current IDS are by and large brought together and experience the ill  ... 
doi:10.22214/ijraset.2018.6010 fatcat:6a2xwbsdrfhzxihd6mmmanbtuy

A Fast Construction of Intrusion Relieved Communication Path based on Trust level and Heuristic Search

R. Reshma, S. K. Srivatsa
2013 International Journal of Computer Applications  
Hence a modified architecture for intrusion detection and intrusion free path detection is constructed and simulated.  ...  In the previous work, we proposed a methodology to construct an intrusion relieved network based on trust level of every node.  ...  new attacks and prevent the attack on network.  ... 
doi:10.5120/10763-5168 fatcat:woe5fzy6ufdgdegu7bi4p5m37i

An overview of Intrusion Detection and Prevention Systems [article]

Keturahlee Coulibaly
2020 arXiv   pre-print
One of these systems are Intrusion Detection Systems (IDS), which can be used as the first defence mechanism or a secondary defence mechanism of a threat or an attack.  ...  Assisting in the mitigation of such attacks, there are also Intrusion Prevention Systems (IPS) whose role has a different purpose than that of IDSs.  ...  In a network to detect malicious attacks capturing all the data going through the network.  ... 
arXiv:2004.08967v1 fatcat:2oqzco7vj5g5paixkm4jqmavye

Intrusion Detection system: A Review of the state of the art

Ajay kaurav, S.Sibi Chakkaravarthy, Pravin R.Patil, M.Vimal Karthik
2014 IOSR Journal of Computer Engineering  
In this paper, a review is made on various intrusion detection systems. The review analysis the whole active intrusion detection system.  ...  Through the extensive survey we analysed the whole pose of the active intrusion detection system. We employed the survey towards overall IDS not only for the specific.  ...  False Negative: A failure of an IDS to detect an actual attack.  ... 
doi:10.9790/0661-1619108112 fatcat:xd4h2eitrnffrbu2f3m7x7h2le

AN INTRUSION DETECTION MODEL BASED ON FUZZY MEMBERSHIP FUNCTION USING GNP

Mahadevappa Immannavar .
2015 International Journal of Research in Engineering and Technology  
Therefore, an intrusion detection model is required to detect intrusion that going to threaten CIA of internet resources.  ...  Normal rules in normal rule pool and intrusion rules in intrusion rule pool. For the new data match degree will be calculated based on available normal rules and intrusion rules.  ...  It keeps on updates system profile which is going contain rules that identifies attacks.  ... 
doi:10.15623/ijret.2015.0408005 fatcat:msilfol3ezak3dwvbspmgikeza

Intrusion Detection System based on Machine Learning : A Review

Pensri Pukkasenung, Thuvanan Borvornvitchotikarn, Duldanai Wanthongchai
2021 Zenodo  
Therefore, additional security tools on IoT network in this paper we proposed a common survey the Intrusion Detection System concept and analyzed Intrusion Detection System (IDS) based on Machine Learning  ...  Keywords—Intrusion Detection System, Machine Learning, Internet of Things, Literature Review  ...  This method used for selecting a feature to detect real-time intrusion attacks in an IoT system.  ... 
doi:10.5281/zenodo.5504296 fatcat:5z7tzr6rgjdmjat3dbktjw2fly

A Constructive Intrusion Detection System for Preventing Attacks in Mobile ADHOC Networks

T. Kamaleshwar, K. Venkatachalapathy
2018 International Journal of Computer Applications  
In MANET it is very difficult to design the robust security solution for various attacks. Here we are analyzing overall performance as well as the security of the Intrusion Detection system.  ...  We propose a Constructive Intrusion detection system based on the network and host based system.  ...  An Intrusion Detection system (IDS) it provides network observation and is an extra wall to secure the network around-the-clock.  ... 
doi:10.5120/ijca2018916554 fatcat:abg2p5tfa5eajplea4h45tidsi

An Improved Hybrid Intrusion Detection System in Cloud Computing

Ajeet KumarGautam, Vidushi Sharma, Shiva Prakash
2012 International Journal of Computer Applications  
For a signature based IDS if an attacker attacks slowly and organized, the attack may go undetected through the IDS, as signatures include factors which are based on duration of the events and the actions  ...  Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks.  ...  In this direction Zhi-Hong Tian, Bin-Xing Fang and Xiao-Chun Yun [19] design AAIDHP (An Architecture for Intrusion Detection using Honey Pot).  ... 
doi:10.5120/8422-2173 fatcat:izzlx7k4bfgptnmi4bbgikm7uq

THE SURVEILLANCE OF INTRUSION DETECTION SYSTEMS AND APPROACHES

Dr. S. Satheesbabu, Dr. P. Gokulakrishnan, Dr. N. Dhanalakshmi
2021 Information Technology in Industry  
Intrusion detection is a necessary device to display networks for attacks or intrusions and document these intrusions in order to take an action.  ...  find vulnerabilities and attack the system In an information system, intrusions are the activities that violate the security policy of the system.  ...  Especially, Intrusion detection is essential in a giant community machine whilst massive quantity of servers and online offerings going for walks in the system.  ... 
doi:10.17762/itii.v9i1.247 fatcat:jmwluirzr5gxzjc2iajzehpzbq
« Previous Showing results 1 — 15 out of 38,762 results