16,233 Hits in 5.3 sec

Comparative Analysis of Machine Learning Algorithms Based on the Outcome of Proactive Intrusion Detection System

Sivaprasad Abirami, Palanikumar S
2020 Helix  
When the live packets are captured and classified without allowing it to enter the network or the host represents a proactive intrusion detection System.  ...  In the case of an Intrusion detection system to classify the normal and the malicious packet, the machine learning classification algorithms are used.  ...  Introduction The intrusion detection system will prevent unwanted packets to enter the system. The system can be divided into two categories of reactive and proactive IDS.  ... 
doi:10.29042/2020-10-5-32-37 fatcat:zimsfxjcrnfvtbs577okh2x57q

Key Issues And Challenges Of Intrusion Detection And Prevention System: Developing Proactive Protection In Wireless Network Environment

M. Salman, B. Budiardjo, K. Ramli
2011 Zenodo  
To overcome this issue, a security solution that includes an intrusion detection and prevention system need to be implemented.  ...  In this paper, first the security drawbacks of wireless network will be analyzed then investigate the characteristics and also the limitations on current wireless intrusion detection and prevention system  ...  Wen-Chuan Hsieh etc. (2004) proposed a Proactive Wireless Intrusion Detection System, which is capable of preventing common wireless attacks such as WEP cracking, MAC address spoofing and war-driving,  ... 
doi:10.5281/zenodo.1056447 fatcat:r4vnjfqakbgb5hoibjtwiv6zvu

Proactive Intrusion Detection and SNMP-Based Security Management: New Experiments and Validation [chapter]

J. B. D. Cabrera, L. Lewis, X. Qin, C. Gutiérrez, W. Lee, R. K. Mehra
2003 Integrated Network Management VIII  
In this paper, we examine the applicability of Proactive Intrusion Detection on a considerably more complex set-up, with hosts associated with three clusters, connected by routers.  ...  In our earlier work we have proposed and developed a methodology for the early detection of Distributed Denial of Service (DDoS) attacks.  ...  We refer the reader to [2] [3] for a detailed discussion of the Proactive Intrusion Detection Methodology.  ... 
doi:10.1007/978-0-387-35674-7_8 fatcat:yckyl4vfrbff3ok5rr4cfzxoeq

Proactive intrusion detection and SNMP-based security management: new experiments and validation

J.B.D. Cabrera, L. Lewis, X. Qin, C. Gutierrez, W. Lee, R.K. Mehra
IFIP/IEEE Eighth International Symposium on Integrated Network Management, 2003.  
In this paper, we examine the applicability of Proactive Intrusion Detection on a considerably more complex set-up, with hosts associated with three clusters, connected by routers.  ...  In our earlier work we have proposed and developed a methodology for the early detection of Distributed Denial of Service (DDoS) attacks.  ...  INTRODUCTION In 1.2] we developed a methodology for utilizing traffic MIB variables for the early detection of Distributed Denial of Service (DDoS) attacks: Proactive Intrusion Detection, as opposed to  ... 
doi:10.1109/inm.2003.1194163 fatcat:ox52w4vm3be7vlzb3lwzonp6ci

An investigation and survey of response options for Intrusion Response Systems (IRSs)

Nor Badrul Anuar, Maria Papadaki, Steve Furnell, Nathan Clarke
2010 2010 Information Security for South Africa  
Intrusion Response Systems (IRSs), active, proactive, reactive and passive response I.  ...  This paper starts a discussion by differentiating the type of operation mode such as Intrusion Detection Systems (IDSs), Intrusion Prevention Systems (IPSs) and Intrusion Response Systems (IRSs).  ...  Contradicting to proactive response, reactive response reacts only after the intrusion is detected.  ... 
doi:10.1109/issa.2010.5588654 fatcat:fytujwpid5ajhjhtezb3c6bcwu

Intrusion Prevention in Information Systems: Reactive and Proactive Responses

Wei T. Yue, Metin Cakanyildirim
2007 Journal of Management Information Systems  
KEY WORDS AND PHRASES: information security, intrusion detection, intrusion preven- tion, intrusion response.  ...  NIST special publication on intrusion detection systems.  ... 
doi:10.2753/mis0742-1222240110 fatcat:cv4nopdl2fcjbjt7ni6ekqkjsi

A taxonomy of intrusion response systems

Natalia Stakhanova, Samik Basu, Johnny Wong
2007 International Journal of Information and Computer Security  
Although intrusion detection systems are being actively developed, research efforts in intrusion response are still isolated.  ...  Recent advances in the field of intrusion detection brought new requirements to intrusion prevention and response. Traditionally, the response to an attack is manually triggered by an administrator.  ...  He also worked on projects for Intrusion Detection Systems on Wireless Networks Security and Specification Based Intrusion Detection Systems.  ... 
doi:10.1504/ijics.2007.012248 fatcat:gxejw5yccfd27eu6yvgvqbdjiy

Real-Time Connection Monitoring of Ubiquitous Networks for Intrusion Prediction: A SequentialKNN Voting Approach

Bokyoung Kang, Dongsoo Kim, Minsoo Kim
2015 International Journal of Distributed Sensor Networks  
Once this predicted probability reaches certain preset threshold value for possible network intrusion, then we can do some preventive actions for this ongoing connection.  ...  accurate classifiers for network intrusion detection [12] .  ...  Section 2 presents several related works about NIDS and NN-based approaches for intrusion detection.  ... 
doi:10.1155/2015/387462 fatcat:7wwtgg37hngaxknmdx4s2rpcpy

Intrusion Detection Systems Technologies and Trends

2018 American Journal of Transportation and Logistics  
IPSs are intrusion detection systems that endeavour to keep an assault by utilizing proactive reactions. 1 Passive Alerting: Passive alarming manages the circulation of data.  ...  IPSs are intrusion detection systems that endeavor to keep an assault by utilizing proactive reactions. 1. Passive Alerting: Passive alarming manages the circulation of data.  ... 
doi:10.28933/ajtl-2018-05-1802 fatcat:qdhqvq52jfex3hnv2wqtm4ukw4

Resilient Intrusion Tolerance through Proactive and Reactive Recovery

Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo
2007 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)  
Therefore, using proactive recovery, one can increase the resilience of any intrusion-tolerant replicated system able to tolerate up to f faults/intrusions: an unbounded number of intrusions may occur  ...  In this work, we propose a complementary approach that combines proactive recovery with services that allow correct replicas to react and recover replicas that they detect or suspect to be compromised.  ...  It is worth to notice that the service provided by the proactive-reactive recovery wormhole is completely orthogonal to the failure/intrusion detection strategy used by a system.  ... 
doi:10.1109/prdc.2007.52 dblp:conf/prdc/SousaBCNV07 fatcat:pgbo54dczndedao5jcdpsfbauq

Obtaining Digital Evidence from Intrusion Detection Systems

Mboupda MoyoAchille, Atsa Etoundi Roger
2014 International Journal of Computer Applications  
This paper proposes an intrusion detection architecture for digital forensic purposes implemented using SNORT program.  ...  Several works have been carried out in the domain of Intrusion Detection and Prevention System (IDPS) but, none of the resulting models taking into account the possibility to collect intrusion related  ...  In order to detect only external intrusion activities, the intrusion detection system was placed directly inside the router as shown in figure 2. Fig. 2.  ... 
doi:10.5120/16649-6623 fatcat:m5ermu4rsffkrk6jwjcnw2jyae

Towards Predictive Real-time Multi-sensors Intrusion Alert Correlation Framework

Maheyzah Md Siraj, Hashim Hussein Taha Albasheer, Mazura Mat Din
2015 Indian Journal of Science and Technology  
Despite of Network Intrusion Detection System/Sensors (NIDSs) deployment in the computer networks to detect various attacks, it raises a serious problem.  ...  It is worth mentioning that to complement NIDSs in detecting the incoming attacks, intrusion alert prediction is an exploratory area for future research for the purpose of improving the quality of correlation  ...  Network Intrusion Detection System (NIDS) is a security mechanism devoted to detect attacker activities on a network.  ... 
doi:10.17485/ijst/2015/v8i12/70658 fatcat:4vntq6aelfaxxjcyi224npznuq

Signature based intrusion detection for wireless ad-hoc networks: a comparative study of various routing protocols

F. Anjum, D. Subhadrabandhu, S. Sarkar
2003 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484)  
In this paper we focus on intrusion detection in wireless networks. The intrusion detection community has been concentrating mainly on wired networks.  ...  We also investigate a relationship between the probability of detecting an intrusion and the number of nodes that must participate in the process of detecting intrusions.  ...  part of the intrusion detection subsystem.  ... 
doi:10.1109/vetecf.2003.1285405 fatcat:vt6asgo7trc4zjmfwgwn64ts5e

Memory consequences of looking back to notice change: Retroactive and proactive facilitation

Larry L. Jacoby, Christopher N. Wahlheim, Colleen M. Kelley
2015 Journal of Experimental Psychology. Learning, Memory and Cognition  
When change was not recollected, detected change produced proactive interference.  ...  Three experiments contrasted recollection of change with differentiation as means of avoiding retroactive interference and proactive interference.  ...  To produce proactive facilitation, detection of change is not sufficient, but in addition, detected change must be recollected.  ... 
doi:10.1037/xlm0000123 pmid:26010827 fatcat:dr72ax5v4nhnlhikd3zek6f5my

The Modern Approach in Wireless Intrusion Prevention System for Ad hoc Network: A Target Oriented Approach

S V Athawale, M A Pund
2017 International Journal of Advanced Research in Computer Science and Software Engineering  
Additionally, work from [8, 9] , encountered challenges in intrusion detection of the early detection.  ...  product with features such as proactive, reactive and passive.  ...  IPS can proactively block the attacks. Signature based approaches focuses on how an attack works, trying to detect certain strings in them.  ... 
doi:10.23956/ijarcsse/v7i2/0127 fatcat:oppwlvggkzfyzcpxwunmuluxha
« Previous Showing results 1 — 15 out of 16,233 results