咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 10 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 7 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 5 篇 信息与通信工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 控制科学与工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 网络空间安全
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 图书情报与档案管...

主题

  • 10 篇 network based in...
  • 4 篇 intrusion detect...
  • 3 篇 cloud computing
  • 2 篇 snort
  • 2 篇 association rule...
  • 2 篇 data mining
  • 2 篇 mapreduce
  • 2 篇 host based intru...
  • 2 篇 signature based ...
  • 2 篇 brute force algo...
  • 1 篇 intrusion detect...
  • 1 篇 clustering
  • 1 篇 intrusion preven...
  • 1 篇 http
  • 1 篇 bayesian classif...
  • 1 篇 anomaly detectio...
  • 1 篇 ddos
  • 1 篇 monitoring
  • 1 篇 servers
  • 1 篇 bot

机构

  • 1 篇 nit surat surat ...
  • 1 篇 bundelkhand univ...
  • 1 篇 mother teresa wo...
  • 1 篇 inst space & tec...
  • 1 篇 indian sch mines...
  • 1 篇 abasyn univ dept...
  • 1 篇 natl yunlin univ...
  • 1 篇 sivet coll chenn...
  • 1 篇 etri attached in...
  • 1 篇 rabindranath tag...
  • 1 篇 nit surat
  • 1 篇 isl engn coll co...
  • 1 篇 city univ london...
  • 1 篇 avinashilingam u...
  • 1 篇 korea univ grad ...
  • 1 篇 tech univ dresde...
  • 1 篇 jntuh comp sci &...
  • 1 篇 city university ...
  • 1 篇 obuda univ john ...
  • 1 篇 sivet college go...

作者

  • 2 篇 muttukrishnan ra...
  • 1 篇 choi younghan
  • 1 篇 arshad ali
  • 1 篇 lee donghoon
  • 1 篇 om hari
  • 1 篇 pande priyanka
  • 1 篇 samrin rafath
  • 1 篇 band shahab s.
  • 1 篇 mathur harsh
  • 1 篇 gautam sunil kum...
  • 1 篇 gupta lalit kuma...
  • 1 篇 v. selvi
  • 1 篇 ramya r.
  • 1 篇 patel dhiren r.
  • 1 篇 d. selvamani
  • 1 篇 nadeem muhammad
  • 1 篇 chirag n. modi
  • 1 篇 devi b. gayathri
  • 1 篇 dharani m. k.
  • 1 篇 dhiren r. patel

语言

  • 10 篇 英文
检索条件"主题词=Network based Intrusion Detection System"
10 条 记 录,以下是1-10 订阅
排序:
Review on Anomaly based network intrusion detection system
Review on Anomaly based Network Intrusion Detection System
收藏 引用
International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT)
作者: Samrin, Rafath Vasumathi, D. ISL Engn Coll Comp Sci & Engn Hyderabad Andhra Pradesh India JNTUH Comp Sci & Engn Hyderabad Andhra Pradesh India
In computer system and network, intrusion detection is an important research area. A lot of mechanisms are available for detect the network intrusion, but that is not able to identify the new kind of attacks. Various ... 详细信息
来源: 评论
Bayesian Classifier and Snort based network intrusion detection system in Cloud Computing
Bayesian Classifier and Snort based Network Intrusion Detect...
收藏 引用
3rd International Conference on Computing Communication and networking Technologies (ICCCNT)
作者: Modi, Chirag N. Patel, Dhiren R. Patel, Avi Muttukrishnan, Rajarajan NIT Surat Surat Gujarat India City Univ London London England
One of the major security issues in cloud computing is to protect against network intrusions that affect confidentiality, availability and integrity of Cloud resources and offered services. To address this issue, we d... 详细信息
来源: 评论
Integrating Signature Apriori based network intrusion detection system (NIDS) in Cloud Computing
收藏 引用
Procedia Technology 2012年 6卷 905-912页
作者: Chirag N. Modi Dhiren R. Patel Avi Patel Muttukrishnan Rajarajan NIT Surat INDIA City University London UK
One of the major security issues in Cloud computing is to detect malicious activities at the network layer. In this paper, we propose a framework integrating network intrusion detection system (NIDS) in the Cloud. Our... 详细信息
来源: 评论
Signature based Semantic intrusion detection system on Cloud  2
Signature Based Semantic Intrusion Detection System on Cloud
收藏 引用
2nd International Conference on Information systems Design and Intelligent Applications (INDIA)
作者: Sangeetha, S. Devi, B. Gayathri Ramya, R. Dharani, M. K. Sathya, P. Avinashilingam Univ Fac Engn Dept Comp Sci & Engn Coimbatore Tamil Nadu India
Now a days, many enterprise applications are using cloud platform. Security is the most sensitive issue in cloud platform. intrusion detection system is used to protect the Virtual machine from threats. This paper pro... 详细信息
来源: 评论
An efficacious intellectual framework for host based intrusion detection system  2nd
An efficacious intellectual framework for host based intrusi...
收藏 引用
2nd International Conference on Recent Trends in Advanced Computing, Disruptive Innovation (ICRTAC-DTI)
作者: Selvamani, D. Selvi, V Sivet Coll Chennai 600073 Tamil Nadu India Mother Teresa Womens Univ Kodaikanal 624101 India
intrusion detection systems (IDS) are indispensible for all types of networks to protect them from the intruders. The IDS have to process millions of network packets with many features, which delay the detection of an... 详细信息
来源: 评论
Machine Learning-based intrusion detection system using Wireless Sensor networks  4
Machine Learning-based Intrusion Detection System using Wire...
收藏 引用
4th International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies, ICAECT 2024
作者: Pande, Priyanka Mathur, Harsh Gupta, Lalit Kumar Rabindranath Tagore University Department of Computer Science and Engineering M.P. Bhopal464993 India Bundelkhand University Department of Computer Science and Engineering Uttar Pradesh Jhansi284128 India
Cybersecurity has grown to be a top priority for both businesses and people in today's networked and digitally driven society. It is essential to put in place efficient security measures to protect sensitive data ... 详细信息
来源: 评论
STROP: Static Approach for detection of Return-Oriented Programming Attack in network
收藏 引用
IEICE TRANSACTIONS ON COMMUNICATIONS 2015年 第1期E98B卷 242-251页
作者: Choi, YoungHan Lee, DongHoon ETRI Attached Inst Taejon 305600 South Korea Korea Univ Grad Sch Informat & Secur Seoul 136701 South Korea
Recently, a malicious user attacks a web browser through a malicious page that exploits the vulnerability of the browser and that executes malicious code. To prevent this attack, some methods have been devised such as... 详细信息
来源: 评论
Intercept the Cloud network From Brute Force and DDoS Attacks via intrusion detection and Prevention system
收藏 引用
IEEE ACCESS 2021年 9卷 152300-152309页
作者: Nadeem, Muhammad Arshad, Ali Riaz, Saman Band, Shahab S. Mosavi, Amir Abasyn Univ Dept Comp Islamabad 75660 Pakistan Inst Space & Technol Dept Comp Sci Islamabad 44000 Pakistan Natl Univ Technol Dept Comp Sci Islamabad 44000 Pakistan Natl Yunlin Univ Sci & Technol Future Technol Res Ctr Touliu 64002 Yunlin Taiwan Tech Univ Dresden Fac Civil Engn D-01069 Dresden Germany Obuda Univ John von Neumann Fac Informat H-1034 Budapest Hungary
Cloud computing is considered to be the best technique for storing data online instead of using a hard drive. It includes three different types of computing services that are provided to remote users via the Internet.... 详细信息
来源: 评论
An efficacious intellectual framework for host based intrusion detection system
收藏 引用
Procedia Computer Science 2019年 165卷 9-17页
作者: D. Selvamani V. Selvi SIVET COLLEGE GOWRIVAKKAM CHENNAI -600073 INDIA MOTHER TERESA WOMEN’S UNIVERSITY KODAIKANAL- 624101 INDIA
intrusion detection systems (IDS) are indispensible for all types of networks to protect them from the intruders. The IDS have to process millions of network packets with many features, which delay the detection of an... 详细信息
来源: 评论
Multivariate Linear Regression Model for Host based intrusion detection  1
收藏 引用
1st International Conference on Computational Intelligence in Data Mining (ICCIDM)
作者: Gautam, Sunil Kumar Om, Hari Indian Sch Mines Dept Comp Sci & Engn Dhanbad 826004 Bihar India
Computer security is an important issue for an organization due to increasing cyber-attacks. There exist some intelligent techniques for designing intrusion detection systems which can protect the computer and network... 详细信息
来源: 评论