Filters








2,511 Hits in 4.8 sec

Intrusion Detection System Based on Data Mining Techniques

Abhinav Kumra, W Jeberson, Klinsega Jeberson
2017 Oriental journal of computer science and technology  
The need for IDS in a system environment and the generic blocks in IDS is also mentioned.The examples are as follows: (1) Misuse intrusion detection system that uses state transition analysis approach,  ...  Intrusion Detection System (IDS) we have provided an overview of different types of intrusion Detection Systems, the advantages and disadvantages of the same.  ...  Application Applications of intrusion detection by data mining are as follows: The goal of intrusion detection is to detect • security violations in information systems.  ... 
doi:10.13005/ojcst/10.02.33 fatcat:amrrr4lsdjf4pmokd4hrsh2mgq

SECURE SEMANTIC COMPUTING

KEVIN W. HAMLEN, BHAVANI THURAISINGHAM
2011 International Journal of Semantic Computing (IJSC)  
Past and current research on the application of semantic web technologies for policy management and inference control, the application of data mining technologies for intrusion and malware detection, and  ...  programming language-based approaches to mobile code certification and data confidentiality enforcement are discussed.  ...  The Java Information Flow (JIF) system implements information flow controls via static type-checking for Java programs [22] .  ... 
doi:10.1142/s1793351x11001201 fatcat:5yddnb5kgngfnpy3urke6ulwai

Evaluation of control flow traces in software applications for intrusion detection

Imran Asad Gul, Nils Sommer, Matthias Rohr, Andre van Hoorn, Wilhelm Hasselbring
2008 2008 IEEE International Multitopic Conference  
A case study demonstrates the intrusion detection approach's applicability in the context of a multi-user Java Web application.  ...  Anomalous control flows indicative for intrusion attempts are detected by continuously monitoring and analyzing the software system.  ...  ModSecurity 4 is a freely available host-based intrusion detection system for Web applications running in the Apache Web server.  ... 
doi:10.1109/inmic.2008.4777765 fatcat:kbsglwog7jatjbsodjxpczp7ge

An Effective Fault-Tolerant Intrusion Detection System under Distributed Environment

Bo Hong, Hui Wang, Zijian Cao, Deepak Gupta
2021 Wireless Communications and Mobile Computing  
By detecting the CPU and memory usage of hosts, TCP connections, network bandwidth, web server operation logs, and the logs of user behavior, the proposed IDS especially focuses on monitoring the first  ...  This paper uses the distributed technology to design and implement an intrusion detection system (IDS) based on the hybrid of Hadoop with some effective open-source technologies.  ...  Spark is not applicable for applications that update the state asynchronously and finely, such as web service storage or incremental web crawler and index; that is, the application model of incremental  ... 
doi:10.1155/2021/2716881 fatcat:om53susmujeqzppgumtf2ligtu

A Classification of Intrusion Detection Systems in the Cloud

Marwa Elsayed, Mohammad Zulkernine
2015 Journal of Information Processing  
This paper presents a novel classification scheme of the state-of-the-art of intrusion detection approaches in the cloud.  ...  The classification and analysis will help in the selection of the proper deployment architectures and detection techniques of IDSs in cloud environments.  ...  There are two trends to incorporate information flow control with intrusion detection to monitor and attest information flow security.  ... 
doi:10.2197/ipsjjip.23.392 fatcat:toie6prmtzfw7glfqcee3namre

DeCore: Detecting Content Repurposing Attacks on Clients' Systems [chapter]

Smitha Sundareswaran, Anna C. Squicciarini
2010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
Web 2.0 platforms are ubiquitously used to share content and personal information, which makes them an inviting and vulnerable target of hackers and phishers alike.  ...  In this paper, we discuss an emerging class of attacks, namely content repurposing attacks, which specifically targets sites that host user uploaded content on Web 2.0 sites.  ...  Acknowledgements The work reported in this paper has been partially supported by the NSF grant CNS 08-31247 (2008-2012).  ... 
doi:10.1007/978-3-642-16161-2_12 fatcat:cygoldgmi5gvveckuwrepxkea4

CIDS: An agent-based intrusion detection system

D. Dasgupta, F. Gonzalez, K. Yallapu, J. Gomez, R. Yarramsettii
2005 Computers & security  
In particular, it is an agent-based monitoring and detection system used to detect intrusions (malfunctions, faults, abnormalities, misuse, deviations etc.) and to provide recommendations (in the form  ...  of common intrusion detection language, IDMEF).  ...  In the Java implementation, a particular class of objects is reserved for control flow and a different class of objects is reserved for the data flow.  ... 
doi:10.1016/j.cose.2005.01.004 fatcat:e4prz4pzprc2xoc5qhkfg5byra

Secured Transaction for Distributed Service System

M. Abhinivesh, Mayank Garg, Karishma, D. P. Acharjya
2015 Indian Journal of Science and Technology  
Web services in general has configuration that represents the constraints and capabilities of the security policies at both internal and end node.  ...  In general, security is more important when concerned to web services and on-line transactions.  ...  Generally intrusion detection system is used for monitoring the root, location and then informs the administrator if network behavior is abnormal.  ... 
doi:10.17485/ijst/2015/v8is2/60449 fatcat:vxthf4gqsjb6xitsnzikasqcdu

A Distributed Intrusion Detection System Using Cooperating Agents [article]

Jaydip Sen
2011 arXiv   pre-print
In this paper, a distributed intrusion detection architecture is presented that is based on autonomous and cooperating agents without any centralized analysis components.  ...  The results show the effectiveness of the system in detecting intrusive activities.  ...  JADE (Java Agent Development Environment) is a middleware developed by TILAB that enables faster development of multi-agent distributed applications based on the peer-to-peer communication architecture  ... 
arXiv:1111.0382v1 fatcat:glffh2v4mjdzzneeqdowjf53oi

The Phoenix framework: a practical architecture for programmable networks

D. Putzolu, S. Bakshi, S. Yadav, R. Yavatkar
2000 IEEE Communications Magazine  
transcoders), multicast, intrusion detection, and Intranet firewalls.  ...  These capabilities enable rapid customization of the network by providing mechanisms to adapt to changing environments for new applications such as multimedia (video conferencing, video on demand, multimedia  ...  Such intrusions are hard to detect, monitor, or trace back to the culprit from a single vantage point in the network.  ... 
doi:10.1109/35.825654 fatcat:mkmiav63yrdhnahzgnb7d6jipe

A Comparison of Intrusion-Tolerant System Architectures

Quyen Nguyen, Arun Sood
2011 IEEE Security and Privacy  
Detection-triggered 2. Algorithm-driven 3. Recovery-based 4. Hybrid Using the above approach, we classify ITS architectures, several of which were part of the OASIS project funded by DARPA [1].  ...  Most of them rely on intrusion detection that triggers recovery mechanisms. SITAR (Scalable Intrusion-Tolerant Architecture) [1]  ...  software vulnerabilities that exist in web-based applications [1] .  ... 
doi:10.1109/msp.2010.145 fatcat:xnib3bv36fhzxjor24iry6onfy

Towards an Integrated Intrusion Detection Monitoring in High Speed Networks

Sallay
2011 Journal of Computer Science  
Conclusion: To satisfy the constraints of Intrusion detection process in term of real-time and efficiency in HSN we need to monitor efficiently the IDS process.  ...  The global level represents evolution of multi-domain intrusion detection process as well as the eventual security defending process through overall network (policy generation, load balancing operations  ...  ACKNOWLEDGMENT This study is a partial result of a project funded by King Abdul Aziz City for Sciences and Technologies (KACST) in the security research track.  ... 
doi:10.3844/jcssp.2011.1094.1104 fatcat:expbc6toyvb2lnuzmyl5im5dqq

AMNESIA

William G. J. Halfond, Alessandro Orso
2005 Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering - ASE '05  
The use of web applications has become increasingly popular in our routine activities such as reading the news, paying bills, and shopping on-line.  ...  In its static part, the technique uses program analysis to automatically build a conservative model of the legitimate queries that could be generated by the application.  ...  Acknowledgments This work was supported in part by National Science Foundation awards CCR-0306372, CCR-0205422, and CCR-0209322 to Georgia Tech.  ... 
doi:10.1145/1101908.1101935 dblp:conf/kbse/HalfondO05 fatcat:zqjdljsu4jhehpo74c3ypr434y

DDoS Attack Analyzer: Using JPCAP and WinCap

Pankaj Shinde, Thaksen J. Parvat
2016 Procedia Computer Science  
Network traffic monitoring is not as straight as they written in theory but also leads to many trends changing changes.  ...  We are proposing the network traffic detection and analyzing tools that mainly focus on the DDoS attack.  ...  As the tools protocol analyzer, traffic analyzer, network traffic monitor, intrusion detection system and mainly in sniffers are integrated by WinCap Jpcap is the collection of java class and interfaces  ... 
doi:10.1016/j.procs.2016.03.103 fatcat:dxr7l3umgvdfrojkgqidw3arte

A closer look at Intrusion Detection System for web applications [article]

Nancy Agarwal, Syed Zeeshan Hussain
2018 arXiv   pre-print
It has been well known methodology for detecting network-based attacks but still immature in the domain of securing web application.  ...  The objective of the paper is to thoroughly understand the design methodology of the detection system in respect to web applications.  ...  Future Scope The review conducted in the paper would prove to be extremely beneficial in identifying future avenues in the research domain of intrusion detection for a web application.  ... 
arXiv:1803.06153v2 fatcat:mgg4m7sczfaa7gf34l74rnfo3e
« Previous Showing results 1 — 15 out of 2,511 results