A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Defending Yourself: The Role of Intrusion Detection Systems
2000
IEEE Software
computer systems and networks from abuse. ...
This article considers the role of IDSs in an organization's overall defensive posture and provides guidelines for IDS deployment, operation, and maintenance. ...
Acknowledgments We thank the members of the CERT staff who contributed to the report on which this article is based: 3 ...
doi:10.1109/52.877859
fatcat:qdasziimtbdsdo7hrfbiswunfq
New Approach to Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System
2015
International Journal of Security and Its Applications
New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks. ...
The system processes these log files to supply system directors a good vary of report-building choices. ...
It plays the very important role in management of any organization's network and its security infrastructure. Thus the management of policy rule could be a vital task for the network security. ...
doi:10.14257/ijsia.2015.9.6.18
fatcat:paz2bzoaqfg37pz2dwpf3nvwpu
New Approach to Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System
2015
International Journal of Communication Technology for Social Networking Services
New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks. ...
The system processes these log files to supply system directors a good vary of report-building choices. ...
It plays the very important role in management of any organization's network and its security infrastructure. Thus the management of policy rule could be a vital task for the network security. ...
doi:10.21742/ijctsns.2015.3.1.02
fatcat:l52vreb2knhklb4wew2gk7l464
The trends of Intrusion Prevention System network
2010
2010 2nd International Conference on Education Technology and Computer
Unlike traditional Intrusion Detection System, IPS has additional features to secure computer network system. ...
prevention system, (vii) monitoring sensor, and (viii) collaboration of UTM. ...
The combining Network-based with other security component, provides an active comprehensive network security. Furthermore, the system does not require the system to be installed in every node. ...
doi:10.1109/icetc.2010.5529697
fatcat:b6x3rynom5annigor32cmdykpq
Taxonomy of Network Security Software According to Features and Attributes
2020
Zenodo
The cyber world reinvented a need for an age-old quest of safety. This research discussed 211 network security software environment according to 12 features. ...
, Two-Factor Authentication, Vulnerability Scanning, Web Threat Management, Web Traffic Reporting. ...
And presenting a comprehensive analysis for the framework of requirements, building blocks, and attacks. ...
doi:10.5281/zenodo.3960570
fatcat:3efov73t6zfqnext3rf5tioshq
Web-Based Architecture for Building Management Systems
2018
Informatică economică
Based on most frequent functions encountered in office buildings from Romania, we propose a minimal web-based architecture for BMS using modular approach, which enables fast exchange of information among ...
This emerging area is yet to be explored and analyzed, with various approaches in practice, yet little scientific analyses available, especially in terms of system architecture. ...
BMS include also the alarm system, for easier management of emergency situations, everything through a single interface. ...
doi:10.12948/issn14531305/22.3.2018.08
fatcat:kntxmz4q7jcttmnbvntwo3nhxe
Characterizing Network Intrusion Prevention System
2011
International Journal of Computer Applications
On contrary, IPS can be used to alarm for attacks within a network and provide for acting on attack preventive with Firewall and IDS function mechanism. ...
Defense system and network monitoring has becomes essential component of computer security to predict and prevent attacks. ...
They present the methods based on the analytic traffic flows with divided in case study. An essential in network security is to monitor and analyzed network traffic for profiling user behavior. ...
doi:10.5120/1811-2439
fatcat:pirx3fj76faibm3anbzmhdkx6e
A smart decision support systems based on a fast classifier and a semantic post reasoner
2013
International Journal of System of Systems Engineering
In this paper we propose an innovative approach for a smart event detection and enriched phenomena comprehension. ...
In particular, the proposed approach is based on a two steps process that tries to quickly identify an alarm and then elaborate the acquired knowledge base with a post reasoner to refine the final decision ...
In the literature some approaches for event detection and decision support based on semantic inference rules for phenomena comprehension are available. ...
doi:10.1504/ijsse.2013.057654
fatcat:6ax2gwbu7raajnsmb2norpwc44
Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System
2015
International Journal of Sensor Networks and Data Communications
New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks. ...
The system processes these log files to supply system directors a good vary of report-building choices. ...
Cooperating security managers While DIDS takes a centralized security approach to network intrusion detection, Cooperating Security Managers (CSM) decentralizes the process. ...
doi:10.4172/2090-4886.1000119
fatcat:2lkqorfiurfbvkgq4qobcar4we
Network defense: Approaches, methods and techniques
2015
Journal of Network and Computer Applications
This paper presents a comprehensive survey of methods and systems introduced by researchers in the past two decades to protect network resources from intrusion. ...
To defend a network from intrusion is a generic problem of all time. It is important to develop a defense mechanism to secure the network from anomalous activities. ...
A typical place for an APIDS is between a web server and the database management system, monitoring the SQL protocol specific to the middleware/business logic as it interacts with the database. ...
doi:10.1016/j.jnca.2015.07.011
fatcat:piuhci3xrjggvp6kuqtzojyh4q
An intrusion detection and prevention system in cloud computing: A systematic review
2013
Journal of Network and Computer Applications
This paper surveys, explores and informs researchers about the latest developed IDPSs and alarm management techniques by providing a comprehensive taxonomy and investigating possible solutions to detect ...
Considering the desired characteristics of IDPS and cloud computing systems, a list of germane requirements is identified and four concepts of autonomic computing self-management, ontology, risk management ...
Acknowledgement The authors wish to thank the Ministry of Higher Education, Malaysia for supporting this research work through the Explora- ...
doi:10.1016/j.jnca.2012.08.007
fatcat:wwch7wh6wfbw7lt5txnfi7ejiq
Comparative Study of Traditional and Next Generation IPS
2018
International Journal of Engineering & Technology
Therefore, this paper presents the limitation of traditional IPS systems, a comparison between IPS and NIGPS and proposes an enhanced model for NIGPS. ...
Furthermore, the Next Generation Intrusion Prevention System (NIGPS) is more suitable that could provide an intelligent IPS solution for new and unknown attacks. ...
Acknowledgement The authors would like to express their gratitude to Universiti Sains Islam Malaysia (USIM) for the support and facilities provided. ...
doi:10.14419/ijet.v7i4.15.21371
fatcat:6hxwvobhmvaftdz6iqhhsuta4m
Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing
[chapter]
2012
Lecture Notes in Computer Science
This paper surveys and explores the possible solutions to detect and prevent intrusions in cloud computing systems by providing a comprehensive taxonomy of existing IDPS. ...
It discusses the key features of IDPS that are challenging and crucial for choosing the right security measures for designing an IDPS. ...
Host-based (HIDPS) monitors the dynamic behavior and the state of a computer system. ...
doi:10.1007/978-3-642-35362-8_33
fatcat:tmq6ndhbojblfdym6g6lsln5ta
Requirement of Security for IoT Application based on Gateway System
2015
International Journal of Security and Its Applications
The security consideration should satisfy a concise set of cryptographic and security mechanisms, single security policy framework, and configuration parameters policydependent. ...
The representative characteristics of IoT have a wide range of access capability, management and protocol interworking. ...
-Proxy for Device Management. -Device registration & discovery, data & control channels, inventory, alarms, configuration, status monitoring. ...
doi:10.14257/ijsia.2015.9.10.18
fatcat:osncf5ajwjgtdawwomxs2mjooe
SDN-based Runtime Security Enforcement Approach for Privacy Preservation of Dynamic Web Service Composition
[article]
2021
arXiv
pre-print
Aiming at the privacy preservation of dynamic Web service composition, this paper proposes a SDN-based runtime security enforcement approach for privacy preservation of dynamic Web service composition. ...
In order to verify the feasibility of this approach, this paper implements an experimental system by using POX controller and Mininet virtual network simulator, and evaluates the effectiveness and performance ...
ACKNOWLEDGMENT This paper has been sponsored and supported by National Natural Science Foundation of China (Grant No.61772270), partially supported by National Natural Science Foundation of China (Grant ...
arXiv:2105.12935v1
fatcat:gsxnwzpwvrf2vjyuq3vaxf53xu
« Previous
Showing results 1 — 15 out of 16,601 results