Filters








16,601 Hits in 8.4 sec

Defending Yourself: The Role of Intrusion Detection Systems

John McHugh, Alan Christie, Julia Allen
2000 IEEE Software  
computer systems and networks from abuse.  ...  This article considers the role of IDSs in an organization's overall defensive posture and provides guidelines for IDS deployment, operation, and maintenance.  ...  Acknowledgments We thank the members of the CERT staff who contributed to the report on which this article is based: 3  ... 
doi:10.1109/52.877859 fatcat:qdasziimtbdsdo7hrfbiswunfq

New Approach to Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System

D. Rajagopal, K. Thilakavalli, K. Syed Ali Fathima
2015 International Journal of Security and Its Applications  
New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks.  ...  The system processes these log files to supply system directors a good vary of report-building choices.  ...  It plays the very important role in management of any organization's network and its security infrastructure. Thus the management of policy rule could be a vital task for the network security.  ... 
doi:10.14257/ijsia.2015.9.6.18 fatcat:paz2bzoaqfg37pz2dwpf3nvwpu

New Approach to Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System

D. Rajagopal, K. Thilakavalli, K. Syed Ali Fathima
2015 International Journal of Communication Technology for Social Networking Services  
New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks.  ...  The system processes these log files to supply system directors a good vary of report-building choices.  ...  It plays the very important role in management of any organization's network and its security infrastructure. Thus the management of policy rule could be a vital task for the network security.  ... 
doi:10.21742/ijctsns.2015.3.1.02 fatcat:l52vreb2knhklb4wew2gk7l464

The trends of Intrusion Prevention System network

Deris Stiawan, Abdul Hanan Abdullah, Mohd. Yazid Idris
2010 2010 2nd International Conference on Education Technology and Computer  
Unlike traditional Intrusion Detection System, IPS has additional features to secure computer network system.  ...  prevention system, (vii) monitoring sensor, and (viii) collaboration of UTM.  ...  The combining Network-based with other security component, provides an active comprehensive network security. Furthermore, the system does not require the system to be installed in every node.  ... 
doi:10.1109/icetc.2010.5529697 fatcat:b6x3rynom5annigor32cmdykpq

Taxonomy of Network Security Software According to Features and Attributes

EVON Abu-TAIEH, Issam AlHadid, Auhood Alfaries, Hanan A. Mengash, Mai Alduailij, Omer Rana, Sufian AlKhawaldeh, Manal A. Alohaly
2020 Zenodo  
The cyber world reinvented a need for an age-old quest of safety. This research discussed 211 network security software environment according to 12 features.  ...  , Two-Factor Authentication, Vulnerability Scanning, Web Threat Management, Web Traffic Reporting.  ...  And presenting a comprehensive analysis for the framework of requirements, building blocks, and attacks.  ... 
doi:10.5281/zenodo.3960570 fatcat:3efov73t6zfqnext3rf5tioshq

Web-Based Architecture for Building Management Systems

Gabriela MEHEDINTU, Ramona Camelia BERE, Catalin Ionut SILVESTRU, Vasilica-Cristina ICOCIU
2018 Informatică economică  
Based on most frequent functions encountered in office buildings from Romania, we propose a minimal web-based architecture for BMS using modular approach, which enables fast exchange of information among  ...  This emerging area is yet to be explored and analyzed, with various approaches in practice, yet little scientific analyses available, especially in terms of system architecture.  ...  BMS include also the alarm system, for easier management of emergency situations, everything through a single interface.  ... 
doi:10.12948/issn14531305/22.3.2018.08 fatcat:kntxmz4q7jcttmnbvntwo3nhxe

Characterizing Network Intrusion Prevention System

Deris Stiawan, Abdul Hanan Abdullah, Mohd. Yazid Idris
2011 International Journal of Computer Applications  
On contrary, IPS can be used to alarm for attacks within a network and provide for acting on attack preventive with Firewall and IDS function mechanism.  ...  Defense system and network monitoring has becomes essential component of computer security to predict and prevent attacks.  ...  They present the methods based on the analytic traffic flows with divided in case study. An essential in network security is to monitor and analyzed network traffic for profiling user behavior.  ... 
doi:10.5120/1811-2439 fatcat:pirx3fj76faibm3anbzmhdkx6e

A smart decision support systems based on a fast classifier and a semantic post reasoner

Flora Amato, Valentina Casola, Mariana Esposito, Antonino Mazzeo, Nicola Mazzocca
2013 International Journal of System of Systems Engineering  
In this paper we propose an innovative approach for a smart event detection and enriched phenomena comprehension.  ...  In particular, the proposed approach is based on a two steps process that tries to quickly identify an alarm and then elaborate the acquired knowledge base with a post reasoner to refine the final decision  ...  In the literature some approaches for event detection and decision support based on semantic inference rules for phenomena comprehension are available.  ... 
doi:10.1504/ijsse.2013.057654 fatcat:6ax2gwbu7raajnsmb2norpwc44

Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System

Rajagopal D Thilakavalli K
2015 International Journal of Sensor Networks and Data Communications  
New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks.  ...  The system processes these log files to supply system directors a good vary of report-building choices.  ...  Cooperating security managers While DIDS takes a centralized security approach to network intrusion detection, Cooperating Security Managers (CSM) decentralizes the process.  ... 
doi:10.4172/2090-4886.1000119 fatcat:2lkqorfiurfbvkgq4qobcar4we

Network defense: Approaches, methods and techniques

Rup Kumar Deka, Kausthav Pratim Kalita, D.K. Bhattacharya, Jugal K. Kalita
2015 Journal of Network and Computer Applications  
This paper presents a comprehensive survey of methods and systems introduced by researchers in the past two decades to protect network resources from intrusion.  ...  To defend a network from intrusion is a generic problem of all time. It is important to develop a defense mechanism to secure the network from anomalous activities.  ...  A typical place for an APIDS is between a web server and the database management system, monitoring the SQL protocol specific to the middleware/business logic as it interacts with the database.  ... 
doi:10.1016/j.jnca.2015.07.011 fatcat:piuhci3xrjggvp6kuqtzojyh4q

An intrusion detection and prevention system in cloud computing: A systematic review

Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, Joaquim Celestino Júnior
2013 Journal of Network and Computer Applications  
This paper surveys, explores and informs researchers about the latest developed IDPSs and alarm management techniques by providing a comprehensive taxonomy and investigating possible solutions to detect  ...  Considering the desired characteristics of IDPS and cloud computing systems, a list of germane requirements is identified and four concepts of autonomic computing self-management, ontology, risk management  ...  Acknowledgement The authors wish to thank the Ministry of Higher Education, Malaysia for supporting this research work through the Explora-  ... 
doi:10.1016/j.jnca.2012.08.007 fatcat:wwch7wh6wfbw7lt5txnfi7ejiq

Comparative Study of Traditional and Next Generation IPS

Mohammed Nadir Ali, Madihah Mohd Saudi, Touhid Bhuiyan, Azreena Abu Bakar
2018 International Journal of Engineering & Technology  
Therefore, this paper presents the limitation of traditional IPS systems, a comparison between IPS and NIGPS and proposes an enhanced model for NIGPS.  ...  Furthermore, the Next Generation Intrusion Prevention System (NIGPS) is more suitable that could provide an intelligent IPS solution for new and unknown attacks.  ...  Acknowledgement The authors would like to express their gratitude to Universiti Sains Islam Malaysia (USIM) for the support and facilities provided.  ... 
doi:10.14419/ijet.v7i4.15.21371 fatcat:6hxwvobhmvaftdz6iqhhsuta4m

Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing [chapter]

Ahmed Patel, Mona Taghavi, Kaveh Bakhtiyari, Joaquim Celestino Júnior
2012 Lecture Notes in Computer Science  
This paper surveys and explores the possible solutions to detect and prevent intrusions in cloud computing systems by providing a comprehensive taxonomy of existing IDPS.  ...  It discusses the key features of IDPS that are challenging and crucial for choosing the right security measures for designing an IDPS.  ...  Host-based (HIDPS) monitors the dynamic behavior and the state of a computer system.  ... 
doi:10.1007/978-3-642-35362-8_33 fatcat:tmq6ndhbojblfdym6g6lsln5ta

Requirement of Security for IoT Application based on Gateway System

Jung Tae Kim
2015 International Journal of Security and Its Applications  
The security consideration should satisfy a concise set of cryptographic and security mechanisms, single security policy framework, and configuration parameters policydependent.  ...  The representative characteristics of IoT have a wide range of access capability, management and protocol interworking.  ...  -Proxy for Device Management. -Device registration & discovery, data & control channels, inventory, alarms, configuration, status monitoring.  ... 
doi:10.14257/ijsia.2015.9.10.18 fatcat:osncf5ajwjgtdawwomxs2mjooe

SDN-based Runtime Security Enforcement Approach for Privacy Preservation of Dynamic Web Service Composition [article]

Yunfei Meng and Zhiqiu Huang and Guohua Shen and Changbo Ke
2021 arXiv   pre-print
Aiming at the privacy preservation of dynamic Web service composition, this paper proposes a SDN-based runtime security enforcement approach for privacy preservation of dynamic Web service composition.  ...  In order to verify the feasibility of this approach, this paper implements an experimental system by using POX controller and Mininet virtual network simulator, and evaluates the effectiveness and performance  ...  ACKNOWLEDGMENT This paper has been sponsored and supported by National Natural Science Foundation of China (Grant No.61772270), partially supported by National Natural Science Foundation of China (Grant  ... 
arXiv:2105.12935v1 fatcat:gsxnwzpwvrf2vjyuq3vaxf53xu
« Previous Showing results 1 — 15 out of 16,601 results