Filters








232 Hits in 5.0 sec

Proactive Intrusion Detection and SNMP-Based Security Management: New Experiments and Validation [chapter]

J. B. D. Cabrera, L. Lewis, X. Qin, C. Gutiérrez, W. Lee, R. K. Mehra
<span title="">2003</span> <i title="Springer US"> Integrated Network Management VIII </i> &nbsp;
In four of the attacks we have obtained valid MIB-based precursors with no false alarms in all experiments. In the remaining two attacks precursors were obtained, but false alarms were observed.  ...  In this paper, we examine the applicability of Proactive Intrusion Detection on a considerably more complex set-up, with hosts associated with three clusters, connected by routers.  ...  The value for the causality index between these variables was obtained using the Figure 1 The NCSU Test Bed Proactive Intrusion Detection and SNMP-Based Security Management Granger Causality Test (  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-0-387-35674-7_8">doi:10.1007/978-0-387-35674-7_8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/yckyl4vfrbff3ok5rr4cfzxoeq">fatcat:yckyl4vfrbff3ok5rr4cfzxoeq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150922171829/http://dl.ifip.org/db/conf/im/im2003/CabreraLQGLM03.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8a/96/8a96294afbb39ec95a8c78dd7762b4a4a46d00a4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-0-387-35674-7_8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Proactive intrusion detection and SNMP-based security management: new experiments and validation

J.B.D. Cabrera, L. Lewis, X. Qin, C. Gutierrez, W. Lee, R.K. Mehra
<i title="Kluwer Academic Publishers"> IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003. </i> &nbsp;
In four of the attacks we have obtained valid MIB-based precursors with no false alarms in all experiments. In the remaining two attacks precursors were obtained, but false alarms were observed.  ...  In this paper, we examine the applicability of Proactive Intrusion Detection on a considerably more complex set-up, with hosts associated with three clusters, connected by routers.  ...  SUMMARY AND CONCLUSIONS The overall results demonstrated the applicability of Proactive Intrusion Detection using more realistic background traffic and sub-networking.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/inm.2003.1194163">doi:10.1109/inm.2003.1194163</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ox52w4vm3be7vlzb3lwzonp6ci">fatcat:ox52w4vm3be7vlzb3lwzonp6ci</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180729015540/https://link.springer.com/content/pdf/10.1007%2F978-0-387-35674-7_8.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f1/aa/f1aadc1716d787158758c76b38848cca23ef463d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/inm.2003.1194163"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Scalability and performance of an agent-based network management middleware

Alan Bivens, Rashim Gupta, Ingo McLean, Boleslaw Szymanski, Jerome White
<span title="">2004</span> <i title="Wiley"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ganzg2oa3rhibnm2sevh7uvisa" style="color: black;">International Journal of Network Management</a> </i> &nbsp;
The main result of this paper is a comparison of scalability and efficiency of our agent-based management middleware and traditional SNMP-based data collection.  ...  between the managers and the network that they manage, as it uses the standard SNMP queries and TCP protocol to interface routers.  ...  Distributing network management applications is a necessity as managed networks continue to grow in size and complexity.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/nem.513">doi:10.1002/nem.513</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5kmpc4xx2belddhwv4xzb4bt54">fatcat:5kmpc4xx2belddhwv4xzb4bt54</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20040507202051/http://www.cs.rpi.edu:80/~guptar/NEM513.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ba/46/ba46bff5129072d184dd6b2dda5460dd7ad678ac.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1002/nem.513"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> wiley.com </button> </a>

An active model-based prototype for predictive network management

S.F. Bush, S. Goel
<span title="">2005</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/onirm7ye2bfobnpwuwaopap5yu" style="color: black;">IEEE Journal on Selected Areas in Communications</a> </i> &nbsp;
Index Terms-Atropos, network management, network prediction, simple network management protocol (SNMP).  ...  In this paper, management support is provided in the form of network components that, simultaneously with their network function, collaboratively project and adjust projections of future state based upon  ...  management [7] and network security [4] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jsac.2005.854108">doi:10.1109/jsac.2005.854108</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vjwuqfzy7zczfmakpmx76jtski">fatcat:vjwuqfzy7zczfmakpmx76jtski</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20090709144258/http://research.ge.com/~bushsf/pdfpapers/01514534.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/82/8b/828becf39292235f9bffbb2387fec8c34e05e933.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/jsac.2005.854108"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

The trends of Intrusion Prevention System network

Deris Stiawan, Abdul Hanan Abdullah, Mohd. Yazid Idris
<span title="">2010</span> <i title="IEEE"> 2010 2nd International Conference on Education Technology and Computer </i> &nbsp;
Unlike traditional Intrusion Detection System, IPS has additional features to secure computer network system.  ...  Finally, as part of our enhancements, we explored the possibility of making framework to collaborate and integrated various technologies of defense system, we called Unified Threat Management (UTM).  ...  Intrusion prevention is a new approach system to defense networking systems, which combine the technique fIrewall with the Intrusion detection properly, which is proactive technique.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icetc.2010.5529697">doi:10.1109/icetc.2010.5529697</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/b6x3rynom5annigor32cmdykpq">fatcat:b6x3rynom5annigor32cmdykpq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808035253/http://eprints.unsri.ac.id/80/1/file_online.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c1/b8/c1b850d19f1b38702c1d31cf955a60cd4a34c240.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icetc.2010.5529697"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Detecting Network Anomalies using Rule-based machine learning within SNMP-MIB dataset [article]

Abdalrahman Hwoij, Mouhammd Al-kasassbeh, Mustafa Al-Fayoumi
<span title="2020-01-18">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
The detection model is built with five Rule-based machine learning classifiers (DecisionTable, JRip, OneR, PART and ZeroR).  ...  Thus, data security, completeness and efficiency could be greatly damaged by this type of attacks.  ...  Network Management Protocol (SNMP) and Management Information Base (MIB) parameters to implement a detection approach and identify anomalies.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2002.02368v1">arXiv:2002.02368v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jdios5wb3vaqznztbfsgprzsyi">fatcat:jdios5wb3vaqznztbfsgprzsyi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321164226/https://arxiv.org/ftp/arxiv/papers/2002/2002.02368.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2002.02368v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Network Access Control Technology - Proposition to contain new security challenges [article]

Abdelmajid Lakbabi, Ghizlane Orhanou, Said El Hajji
<span title="2013-04-02">2013</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
new security posture that coordinate and share security information between different network security components, using a central policy server that will be the NAC server or the PDP (the Policy Decision  ...  Traditional products working independently are no longer sufficient, since threats are continually gaining in complexity, diversity and performance; In order to proactively block such threats we need more  ...  time, to prevent an intrusion once detected by the IDS.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1304.0807v1">arXiv:1304.0807v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ugj6jgzmdfdfvfhl6crmy66dly">fatcat:ugj6jgzmdfdfvfhl6crmy66dly</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200828045232/https://arxiv.org/ftp/arxiv/papers/1304/1304.0807.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ba/51/ba515fadee8ce1c8cada33832e89779eb10fa87d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1304.0807v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Network Access Control Technology—Proposition to Contain New Security Challenges

Abdelmajid Lakbabi, Ghizlane Orhanou, Said El Hajji
<span title="">2012</span> <i title="Scientific Research Publishing, Inc,"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/fakky7235zh5hdho2lhzhjrw5e" style="color: black;">International Journal of Communications, Network and System Sciences</a> </i> &nbsp;
new security posture that coordinate and share security information between different network security components, using a central policy server that will be the NAC server or the PDP (the Policy Decision  ...  Traditional products working independently are no longer sufficient, since threats are continually gaining in complexity, diversity and performance; In order to proactively block such threats we need more  ...  Manager need to send and receive SNMP messages to/from Switchs).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4236/ijcns.2012.58061">doi:10.4236/ijcns.2012.58061</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qfjpdy436zbabgzv4yvjwbxqn4">fatcat:qfjpdy436zbabgzv4yvjwbxqn4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170923115503/http://file.scirp.org/pdf/IJCNS20120800007_23430945.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/99/53/995345b99b33495a153b40cf98931ef12dfad559.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.4236/ijcns.2012.58061"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Clustering extension of MOVICAB-IDS to identify SNMP community searches

R. Sanchez, A. Herrero, E. Corchado
<span title="2014-12-24">2014</span> <i title="Oxford University Press (OUP)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/mwzmwwmscfe4vnzrjlt5itd2ju" style="color: black;">Logic Journal of the IGPL</a> </i> &nbsp;
Its main goal was to provide security personnel with an intuitive and informative visualization of network traffic to ease intrusion detection.  ...  As a result, SNMP data are quite sensitive and liable to potential attacks. Indeed, an attack based on this protocol may severely compromise system security [14] .  ...  Finally [20] discusses on how the clustering algorithm is applied to intrusion detection and analyses intrusion detection algorithm based on clustering problems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/jigpal/jzu035">doi:10.1093/jigpal/jzu035</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/w3n2jxg675ferawlfa2s35hly4">fatcat:w3n2jxg675ferawlfa2s35hly4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170809121812/http://www.gicap.ubu.es/publications/2015/PDF/2015_c01_Clustering_Extension.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f0/9b/f09b7053e0673cdcc3061c82f9b1f40177cd2e51.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1093/jigpal/jzu035"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> oup.com </button> </a>

Moving Target Defense Strategy for Mitigating Denial of Service Attack in the Public Cloud Environment

<span title="2019-08-30">2019</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/h673cvfolnhl3mnbjxkhtxdtg4" style="color: black;">International Journal of Engineering and Advanced Technology</a> </i> &nbsp;
But for achieving the same in real time, needs the new prominent technology cloud computing.  ...  Internet is a network of interconnected systems which works collaboratively and services the users without any disruption.  ...  The solution starts from Firewalls, Intrusion Detection System, Intrusion Prevention Systems and cloud-based anti-DoS.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijeat.f8077.088619">doi:10.35940/ijeat.f8077.088619</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/e5l3lzfxfresfafrci2wwhtm5u">fatcat:e5l3lzfxfresfafrci2wwhtm5u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200207191518/https://www.ijeat.org/wp-content/uploads/papers/v8i6/F8077088619.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a0/82/a082ffb8e21059a215f6a23aeb065c4ee50971b8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijeat.f8077.088619"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Bistro data feed management system

Vladislav Shkapenyuk, Theodore Johnson, Divesh Srivastava
<span title="">2011</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vxrc3vebzzachiwy3nopwi3h5u" style="color: black;">Proceedings of the 2011 international conference on Management of data - SIGMOD &#39;11</a> </i> &nbsp;
We describe our feed analyzer that discovers the naming structure of incoming data files to detect new feeds, dropped feeds, feed changes, or lost data in an existing feed.  ...  The Bistro data feed manager, designed and implemented at AT&T Labs-Research, simplifies and automates this complex task of data feed management: efficiently handling incoming raw files, identifying data  ...  The list is propagated to interested subscribers who can assign appropriate feed names and confirm the validity of the new feed definitions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1989323.1989437">doi:10.1145/1989323.1989437</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sigmod/ShkapenyukJS11.html">dblp:conf/sigmod/ShkapenyukJS11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zwndo67xfzbl7bdmpk7ogvztda">fatcat:zwndo67xfzbl7bdmpk7ogvztda</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130327163740/http://www.research.att.com/export/sites/att_labs/techdocs/TD_100454.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3e/a4/3ea419a8817f42d193ce6f5e629818d1f19f2168.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1989323.1989437"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

VISUALIZATION AND CLUSTERING FOR SNMP INTRUSION DETECTION

Raúl Sánchez, Álvaro Herrero, Emilio Corchado
<span title="2013-10-03">2013</span> <i title="Informa UK Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qihouvi5hbflvedve6k4wieu3u" style="color: black;">Cybernetics and systems</a> </i> &nbsp;
Through the experimental validation it is shown that the proposed techniques could be compatible and consequently applied to a continuous network flow for intrusion detection.  ...  To do that, MOVICAB-IDS, previously proposed as a hybrid intelligent Intrusion Detection System (IDS) based on visualization techniques, is upgraded by adding automatic response thanks to clustering methods  ...  Fund), and SA405A12-2 from Junta de Castilla y León.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1080/01969722.2013.803903">doi:10.1080/01969722.2013.803903</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/mvfehi4vgff7fnpfztwtsldagm">fatcat:mvfehi4vgff7fnpfztwtsldagm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170922231342/http://riubu.ubu.es/bitstream/10259/3859/1/S%c3%a1nchez-CS_2013.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/13/52/13525e4c3b6dca0a91326b41c269a661a9924506.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1080/01969722.2013.803903"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> tandfonline.com </button> </a>

DDoS Attack Detection and Classification using Machine Learning Models with Real-Time Dataset Created

Harrsheeta Sasikumar
<span title="2021-01-30">2021</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3sfifsouvjgadp4gfj54u3z2ku" style="color: black;">International journal of recent technology and engineering</a> </i> &nbsp;
The DDoS attack is detected by considering the various SNMP parameters and classifying using machine learning technique like bagging, boosting and ensemble models.  ...  DDoS uses networked devices into remotely controlled bots and generates attack. The proposed system detects the DDoS attack and malware with high detection accuracy using machine learning algorithms.  ...  EXPERIMENT The dataset that was analysed for this experiment on IDS to enhance cloud security was generated by using virtual instances running in a cloud security testbed.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijrte.e5217.019521">doi:10.35940/ijrte.e5217.019521</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ytp7xoyelncsfc572tojanydse">fatcat:ytp7xoyelncsfc572tojanydse</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210303074338/https://www.ijrte.org/wp-content/uploads/papers/v9i5/E5217019521.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a4/bf/a4bf2df63824ffb61fa1bcde9ce982674298e8ce.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijrte.e5217.019521"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Characterizing Network Intrusion Prevention System

Deris Stiawan, Abdul Hanan Abdullah, Mohd. Yazid Idris
<span title="2011-01-12">2011</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
Unlike traditional Intrusion Detection System (IDS), Intrusion Prevention System (IPS) has additional features to secure computer network system.  ...  IPS combines the technique firewall (data link layer, network layer, transport layer and application layer) with that of the IDS properly with proactive technique, it is a new approach system to defense  ...  Intrusion Prevention System (IPS) is a new approach system to defense networking systems, which combine the technique firewall with that of the Intrusion Detection properly, which is proactive technique  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/1811-2439">doi:10.5120/1811-2439</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pirx3fj76faibm3anbzmhdkx6e">fatcat:pirx3fj76faibm3anbzmhdkx6e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170813181045/http://www.ijcaonline.org/volume14/number1/pxc3872439.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b6/11/b611789aa991dbf4d0dc6f3ff4644dd71a25213a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/1811-2439"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Emerging Trends in Data Center Management Automation

Moises Levy, Anitha Subburaj
<span title="2021-01-27">2021</span> <i title="IEEE"> 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC) </i> &nbsp;
New and emerging technologies have consolidated the Fourth Industrial Revolution, an era of cyber-physical systems, where the physical and digital worlds are closely connected.  ...  A growing number of new technologies are transforming mission critical facilities into a highly connected, smart, and more efficient, productive and sustainable industry.  ...  Proactive maintenance. Unsupervised (unlabeled data) Modeling and simulations. Behavior prediction. Resource optimization. Anomalies detection. Intrusion detection. Identifying like things.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ccwc51732.2021.9375837">doi:10.1109/ccwc51732.2021.9375837</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vvcqoirs5bb5rjy7imi7e5tyju">fatcat:vvcqoirs5bb5rjy7imi7e5tyju</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210718023102/https://ieeexplore.ieee.org/ielx7/9375825/9375905/09375837.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/96/09/960939646306a684258f769b5a5f1ea150aac73d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/ccwc51732.2021.9375837"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 232 results