Sciweavers

800 search results - page 11 / 160
» Intrusion Detection Systeme (IDS)
Sort
View
DBSEC
2001
115views Database» more  DBSEC 2001»
13 years 9 months ago
Randomly roving agents for intrusion detection
Agent based intrusion detection systems IDS have advantages such as scalability, recon gurability, and survivability. In this paper, we introduce a mobile-agent based IDS, called ...
Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth...
ITIIS
2010
190views more  ITIIS 2010»
13 years 2 months ago
An Efficient String Matching Algorithm Using Bidirectional and Parallel Processing Structure for Intrusion Detection System
Rapid growth of internet applications has increased the importance of intrusion detection system (IDS) performance. String matching is the most computation-consuming task in IDS. ...
Gwo-Ching Chang, Yue-Der Lin
COMCOM
2002
189views more  COMCOM 2002»
13 years 7 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
EUROSEC
2010
ACM
14 years 24 days ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
IRI
2005
IEEE
14 years 1 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...