Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "intrusion detection" wg kryterium: Temat


Tytuł:
Intrusion Detection Systems : Model and implementation of module reacting on intrusion to computer system
Autorzy:
Barczak, A.
Bereza, G.
Powiązania:
https://bibliotekanauki.pl/articles/92857.pdf
Data publikacji:
2010
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
intrusion detection
vulnerability scanning
intrusion detection system
IDS architecture
Opis:
The problems of intrusion detection capabilities are considered in this paper. The general idea of structure, model of IDS (Intrusion Detection System) and overall construction is presented with emphasize many problems which appear while creating procedures of such a tool.
Źródło:
Studia Informatica : systems and information technology; 2010, 1-2(14); 5-11
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Methods for increasing security of web servers
Autorzy:
Nycz, M.
Hajder, M.
Nienajadlo, S
Powiązania:
https://bibliotekanauki.pl/articles/106196.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
security
web server
intrusion detection
intrusion prevention
Opis:
This article is addressed in most part to people dealing with security of web servers. This paper begins with presenting the statistical dimension of the issue of data security in the modern Internet. This paper begins with presenting statistics dealing with issues of data security on the modern World Wide Web. The authors main focus in this work is presenting the challenges of dealing with security and protection of web communication. The work analyses the security of implementing SSL/TLS (Secure Socket Layer/Transport Layer Security) protocol and proposes a new method of increasing security of web servers. This article is addressed to people dealing with analysis and security of web servers.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2016, 16, 2; 39-42
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
New architecture of system intrusion detection and prevention
Autorzy:
Nycz, M.
Hajder, M.
Gerka, A.
Powiązania:
https://bibliotekanauki.pl/articles/106214.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
intrusion detection
network security
IDS
IPS
Opis:
In this article there has been presented new intrusion detection and prevention algorithm implemented on Raspberry Pi platform. The paper begins with the presentation of research methodology in the field of Intrusion Detection Systems. Adequate supervision and control over network traffic is crucial for the security of information and communication technology. As a result of the limited budget allocated for the IT infrastructure of small businesses and the high price of dedicated solutions, many companies do not use mentioned systems. Therefore, in this order, there has been proposed monitoring solution based on the generally available Raspberry Pi platform. The paper is addressed to network administrators.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2016, 16, 2; 20-24
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A project and implementation of the testing system for Intrusion Detection Systems. Part 1
Autorzy:
Barczak, A.
Orzoł, A.
Powiązania:
https://bibliotekanauki.pl/articles/92864.pdf
Data publikacji:
2009
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
intrusion detection systems (IDS)
IDS
penetration tests
Opis:
In the first part of the article there will be described basic terms and problems concerning IDS discipline and penetration tests. The second part of the article will show the model of the testing system of the Intrusion Detection Systems
Źródło:
Studia Informatica : systems and information technology; 2009, 1(12); 5-13
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A project and implementation of the testing system for Intrusion Detection Systems. Part II
Autorzy:
Barczak, A.
Orzol, A.
Powiązania:
https://bibliotekanauki.pl/articles/92956.pdf
Data publikacji:
2009
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
intrusion detection systems (IDS)
IDS
IDS tester
Źródło:
Studia Informatica : systems and information technology; 2009, 2(13); 49-61
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Application of the Complex Event Processing system for anomaly detection and network monitoring
Autorzy:
Frankowski, G.
Jerzak, M.
Miłostan, M.
Nowak, T.
Pawłowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/305323.pdf
Data publikacji:
2015
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
network monitoring
intrusion detection
anomaly detection
complex event processing
Opis:
Protection of infrastructures for e-science, including grid environments and NREN facilities, requires the use of novel techniques for anomaly detection and network monitoring. The aim is to raise situational awareness and provide early warning capabilities. The main operational problem that most network operators face is integrating and processing data from multiple sensors and systems placed at critical points of the infrastructure. From a scientific point of view, there is a need for the efficient analysis of large data volumes and automatic reasoning while minimizing detection errors. In this article, we describe two approaches to Complex Event Processing used for network monitoring and anomaly detection and introduce the ongoing SECOR project (Sensor Data Correlation Engine for Attack Detection and Support of Decision Process), supported by examples and test results. The aim is to develop methodology that allows for the construction of next-generation IDS systems with artificial intelligence, capable of performing signature-less intrusion detection.
Źródło:
Computer Science; 2015, 16 (4); 351-371
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Intrusion Detection Systems : Model and implementation of a knowledge base of intrusions into the computer system
Autorzy:
Barczak, A.
Tokajuk, G.
Powiązania:
https://bibliotekanauki.pl/articles/92979.pdf
Data publikacji:
2010
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
intrusion detection systems (IDS)
IDS
knowledge base systems
Opis:
There are many complementary approaches to detecting intrusions e.g. behavior based approach, knowledge-based (KB) approach. The paper described the last one. The essential problems of determination of a KB for intrusion detection systems (IDS), prepared of threat signature, architecture of database containing the rules are considered.
Źródło:
Studia Informatica : systems and information technology; 2010, 1-2(14); 13-22
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Testing of IDS model using several intrusion detection tools
Autorzy:
Ennert, M.
Chovancová, E.
Dudláková, Z.
Powiązania:
https://bibliotekanauki.pl/articles/122490.pdf
Data publikacji:
2015
Wydawca:
Politechnika Częstochowska. Wydawnictwo Politechniki Częstochowskiej
Tematy:
intrusion detection systems (IDS)
computer security
IDS testing
Opis:
The aim of this work is to provide set of selected tests on IDS model that would enlarge the functionality of intrusion detection systems. Designed model is using several IDS, which allows it to investigate larger bandwidth and capture more attacks. This system consists of central master node and devices on which the intrusion detection systems are. The tests were designed with the attribute of repeatability and universality. They are divided into five categories which explore specific attributes of intrusion detection system.
Źródło:
Journal of Applied Mathematics and Computational Mechanics; 2015, 14, 1; 55-62
2299-9965
Pojawia się w:
Journal of Applied Mathematics and Computational Mechanics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Anomaly Detection Framework Based on Matching Pursuit for Network Security Enhancement
Autorzy:
Renk, R.
Hołubowicz, W.
Powiązania:
https://bibliotekanauki.pl/articles/309519.pdf
Data publikacji:
2011
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
anomaly detection
intrusion detection
matching pursuit
network security
signal processing
Opis:
In this paper, a framework for recognizing network traffic in order to detect anomalies is proposed. We propose to combine and correlate parameters from different layers in order to detect 0-day attacks and reduce false positives. Moreover, we propose to combine statistical and signal-based features. The major contribution of this paper are: novel framework for network security based on the correlation approach as well as new signal based algorithm for intrusion detection using matching pursuit.
Źródło:
Journal of Telecommunications and Information Technology; 2011, 1; 32-36
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On Efficiency of Selected Machine Learning Algorithms for Intrusion Detection in Software Defined Networks
Autorzy:
Jankowski, D.
Amanowicz, M.
Powiązania:
https://bibliotekanauki.pl/articles/963945.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
software defined network
intrusion detection
machine learning
Mininet
SDN
Opis:
We propose a concept of using Software Defined Network (SDN) technology and machine learning algorithms for monitoring and detection of malicious activities in the SDN data plane. The statistics and features of network traffic are generated by the native mechanisms of SDN technology.In order to conduct tests and a verification of the concept, it was necessary to obtain a set of network workload test data.We present virtual environment which enables generation of the SDN network traffic.The article examines the efficiency of selected machine learning methods: Self Organizing Maps and Learning Vector Quantization and their enhanced versions.The results are compared with other SDN-based IDS.
Źródło:
International Journal of Electronics and Telecommunications; 2016, 62, 3; 247-252
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Detecting Password File Theft using Predefined Time-Delays between Certain Password Characters
Autorzy:
Mahmoud, K. W.
Mansour, K.
Makableh, A.
Powiązania:
https://bibliotekanauki.pl/articles/308289.pdf
Data publikacji:
2017
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
access control
intrusion detection systems (IDS)
network security
password protection
Opis:
This paper presents novel mechanisms that effectively detect password file thefts and at the same time prevent uncovering passwords. The proposed mechanism uses delay between consecutive keystrokes of the password characters. In presented case, a user should not only enter his password correctly during the sign-up process, but also needs to introduce relatively large time gaps between certain password characters. The proposed novel approaches disguise stored passwords by adding a suffix value that helps in detecting password file theft at the first sign-in attempt by an adversary who steals and cracks the hashed password file. Any attempt to login using a real password without adding the time delays in the correct positions may considered as an impersonation attack, i.e. the password file has been stolen and cracked.
Źródło:
Journal of Telecommunications and Information Technology; 2017, 4; 101-108
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Employment of neural network based classifier for intrusion detection
Autorzy:
Vaitsekhovich, L.
Golovko, V.
Powiązania:
https://bibliotekanauki.pl/articles/386338.pdf
Data publikacji:
2008
Wydawca:
Politechnika Białostocka. Oficyna Wydawnicza Politechniki Białostockiej
Tematy:
systemy wykrywania włamań
sieci neuronowe
intrusion detection systems (IDS)
neural networks
Opis:
Most current Intrusion Detection Systems (IDS) examine all data features to detect intrusion. Also existing intrusion detection approaches have some limitations, namely impossibility to process a large number of audit data for real-time operation, low detection and recognition accuracy. To overcome these limitations, we apply modular neural network models to detect and recognize attacks in computer networks. They are based on the combination of principal component analysis (PCA) neural networks and multilayer perceptrons (MLP). PCA networks are employed for important data extraction and to reduce high dimensional data vectors. We present two PCA neural networks for feature extraction: linear PCA (LPCA) and nonlinear PCA (NPCA). MLP is employed to detect and recognize attacks using feature-extracted data instead of original data. The proposed approaches are tested with the help of KDD-99 dataset. The experimental results demonstrate that the designed models are promising in terms of accuracy and computational time for real world intrusion detection.
Źródło:
Acta Mechanica et Automatica; 2008, 2, 4; 93-98
1898-4088
2300-5319
Pojawia się w:
Acta Mechanica et Automatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Intrusion Detection in Heterogeneous Networks of Resource-Limited Things
Autorzy:
Kozakiewicz, A.
Lasota, K.
Marks, M.
Powiązania:
https://bibliotekanauki.pl/articles/307880.pdf
Data publikacji:
2015
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
client honeypot
internet of things (IoT)
intrusion detection
wireless sensor network
Opis:
The paper discusses the threats to networks of resource-limited things such as wireless sensors and the different mechanisms used to deal with them. A novel approach to threat detection is proposed. MOTHON is a movement-assisted threat detection system using mobility to enhance a global threat assessment and provide a separate physical secure channel to deliver collected information.
Źródło:
Journal of Telecommunications and Information Technology; 2015, 4; 10-14
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Battery Drain Denial-of-Service Attacks and Defenses in the Internet of Things
Autorzy:
Ioulianou, Philokypros P.
Vassilakis, Vassilios G.
Logothetis, Michael D.
Powiązania:
https://bibliotekanauki.pl/articles/308296.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
battery drain
ContikiOS
Cooja simulator
denial-of-service
intrusion detection
IoT
RPL
Opis:
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a popular routing protocol used in wireless sensor networks and in the Internet of Things (IoT). RPL was standardized by the IETF in 2012 and has been designed for devices with limited resources and capabilities. Open-source RPL implementations are supported by popular IoT operating systems (OS), such as ContikiOS and TinyOS. In this work, we investigate the possibility of battery drain Denial-of-Service (DoS) attacks in the RPL implementation of ContikiOS. In particular, we use the popular Cooja simulator and implement two types of DoS attacks, particularly version number modification and “Hello” flooding. We demonstrate the impact of these attacks on the power consumption of IoT devices. Finally, we discuss potential defenses relying on distributed intrusion detection modules.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 2; 37-45
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Towards the Protection of Critical Information Infrastructures using a Lightweight, Non-intrusive Embedded System
Autorzy:
Skitsas, M.
Efstathiou, N.
Charalambous, E.
Koutras, N.
Efthymiou, C.
Powiązania:
https://bibliotekanauki.pl/articles/2069125.pdf
Data publikacji:
2016
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
critical infrastructure
critical information infrastructure
CIIP
intrusion detection systems (IDS)
IDS
cybercrime
Opis:
Critical Infrastructures (CIs), such as those that are found in the energy, financial, transport, communications, water, health and national security sectors, are an essential pillar to the well-being of the national and international economy, security and quality of life. These infrastructures are dependent on a wide variety of highly interconnected information systems for their smooth, reliable and continuous operation. Cybercrime has become a major threat for such Critical Information Infrastructures (CIIs). To mitigate this phenomenon, several techniques have been proposed within the space of Intrusion Detection Systems (IDSs). IDS is an important and necessary component in ensuring network security and protecting network resources and network infrastructures. In this paper, we propose a lightweight, non-intrusive generic embedded system that aids in the protection of CIIs. The operation of the proposed system is based on state of the art IDS and other open source frameworks for the monitoring and supporting services and aims to fulfill the end-user’s requirements. The generic and non-intrusive nature of the system along with the low configuration effort allows rapid deployment to a wide range of CII nodes such as telecommunication routers and smart grid nodes, as well as for single endpoint protection.
Źródło:
Journal of Polish Safety and Reliability Association; 2016, 7, 1; 187--192
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies