Welcome![Sign In][Sign Up]
Location:
Search - intrusion detection system

Search list

[Linux-Unixids

Description: 作者自己修改的一个基于网络的入侵检测系统-The author himself revised a web-based Intrusion Detection System
Platform: | Size: 13312 | Author: xiongping | Hits:

[Internet-Networkidsbasedagent

Description: 基于agent的入侵检测系统采用java编写-intrusion detection system based on agent write with java
Platform: | Size: 39936 | Author: zhs | Hits:

[Internet-Network网络入侵检测系统(源码)

Description: 网络入侵检测系统-Network Intrusion Detection system
Platform: | Size: 2161664 | Author: 张三 | Hits:

[Internet-Network脚本

Description: 一个开放源码的高级NIDS系统 目前最著名最活跃的开放源码NIDS项目,定位于轻量级的入侵检测系统-an open source system is currently senior NIDS most famous of the most active open source projects NIDS, located in the lightweight Intrusion Detection System
Platform: | Size: 7168 | Author: 浪天 | Hits:

[Internet-NetworkIDS

Description: 网络入侵检测系统,属于本人毕业设计的一部分,希望大家指正-network intrusion detection system, belonging to my graduation part of the design, we hope that the correction
Platform: | Size: 11264 | Author: | Hits:

[AI-NN-PRlisys-0.1

Description: 基于人工免疫原理的入侵检测系统框架,有着很好的扩展性,由java 语言实现。-on the immune-based Intrusion Detection System Framework, the good scalability, java language.
Platform: | Size: 79872 | Author: 孙冰 | Hits:

[Industry researchbaseAgent

Description: 文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,针对成簇ad hoc网络提出了一种基于移动代理的入侵监测系统结构-described in the text intrusion detection technology on the basis of relevant content to mobile agent technology into Intrusion Detection System Clustered against ad hoc network of a mobile agent-based Intrusion Detection System
Platform: | Size: 100352 | Author: joe | Hits:

[Software EngineeringAgentDIDS

Description: 本文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,提出了一种基于移动代理的入侵监测系统结构-Based on the intrusion detection technology on the basis of content, Mobile Agent technology will be the introduction of Intrusion Detection System, a Mobile Agent Based Intrusion Detection System
Platform: | Size: 5769216 | Author: joe | Hits:

[Industry researchIDS111223

Description: 针对DIDS网络提出了一种基于移动代理的入侵监测系统结构-against DIDS network presents a Mobile Agent Based Intrusion Detection System
Platform: | Size: 6144 | Author: joe | Hits:

[Internet-Networkiids

Description: 加入了ac_bm匹配并完成了部分界面,还有部分功能有待实现的网络入侵检测系统-joined the ac_bm match and completed a part of the interface, there are some functions to be achieved Network Intrusion Detection System
Platform: | Size: 930816 | Author: yu | Hits:

[Software Engineeringids_ma

Description: 基于移动代理的分布式入侵检测系统的研究,入侵检测-Mobile Agent Based Distributed Intrusion Detection System, Intrusion Detection
Platform: | Size: 74752 | Author: 陈晓峰 | Hits:

[source in ebooknids

Description: 网络入侵检测系统的原代码,是对snort的进一步改进和完善-Network Intrusion Detection System s original code, is a snort of further improvement and refinement
Platform: | Size: 2241536 | Author: laizhengwen | Hits:

[Internet-Networkperfect-IDS

Description: 一个商业版入侵检测系统的核心代码!非常强大,绝对你吸引你!-A commercial version of intrusion detection system s core code! Very powerful, you definitely attract you!
Platform: | Size: 160768 | Author: Shi | Hits:

[Internet-Networkintrusiondetection

Description: 网络入侵检测系统,还需完善,有源代码,能分析数据包-Network intrusion detection system needs to be perfect, active code, capable of analyzing packet
Platform: | Size: 2257920 | Author: lilang | Hits:

[Internet-Networkcv

Description: 入侵检测系统源码分析,3. 能够分析数据包,甚至能够对系统日志进行检测和分析。-Intrusion Detection System source code analysis, 3. Be able to analyze the data packets, and can even log on the system testing and analysis.
Platform: | Size: 2245632 | Author: 江尘封 | Hits:

[Windows DevelopAttacksClassificationinAdaptivIntrusion

Description: Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious network-based or host-based attacks by using traditional statistical methods to new data mining approaches in last decades. However, today s commercially available intrusion detection systems are signature-based that are not capable of detecting unknown attacks. In this paper, we present a new learning algorithm for anomaly based network intrusion detection system using decision tree algorithm that distinguishes attacks from normal behaviors and identifies different types of intrusions. Experimental results on the KDD99 benchmark network intrusion detection dataset demonstrate that the proposed learning algorithm achieved 98 detection rate (DR) in comparison with other existing methods.-Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious network-based or host-based attacks by using traditional statistical methods to new data mining approaches in last decades. However, today s commercially available intrusion detection systems are signature-based that are not capable of detecting unknown attacks. In this paper, we present a new learning algorithm for anomaly based network intrusion detection system using decision tree algorithm that distinguishes attacks from normal behaviors and identifies different types of intrusions. Experimental results on the KDD99 benchmark network intrusion detection dataset demonstrate that the proposed learning algorithm achieved 98 detection rate (DR) in comparison with other existing methods.
Platform: | Size: 312320 | Author: keerthi | Hits:

[Windows DevelopFuzzyIntrusionDetectionSystemviaDataMining

Description: There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is built as a hardware product with its own hardware platform (IDS appliance). In this paper, a host based intrusion detection system, that uses the idea of tracing system calls, is introduced. As a program runs, it uses the services of the underlying operating system to do some system calls. This system does not exactly need to know the program codes of each process. Normal and intrusive behaviors are collected with gathering the sequences of system calls for each process. Analysis of data is done via data mining and fuzzy techniques. Data mining is used to extract normal behaviors (normal unique rules) and Fuzzy to enhance intelligence of the System. The proposed system is shown to improve the performance, and decrease size of database, time complexity, and rate of false alarms.-There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is built as a hardware product with its own hardware platform (IDS appliance). In this paper, a host based intrusion detection system, that uses the idea of tracing system calls, is introduced. As a program runs, it uses the services of the underlying operating system to do some system calls. This system does not exactly need to know the program codes of each process. Normal and intrusive behaviors are collected with gathering the sequences of system calls for each process. Analysis of data is done via data mining and fuzzy techniques. Data mining is used to extract normal behaviors (normal unique rules) and Fuzzy to enhance intelligence of the System. The proposed system is shown to improve the performance, and decrease size of database, time complexity, and rate of false alarms.
Platform: | Size: 710656 | Author: keerthi | Hits:

[Software EngineeringIDS

Description: A Java Based Network Intrusion Detection System (IDS)
Platform: | Size: 29696 | Author: idriss | Hits:

[AI-NN-PRBP-Intrusion-Detection-System

Description: 本文详细介绍了BP神经网络在入侵检测系统中的应用及优化。-This paper describes the application and optimization of the BP neural network intrusion detection system.
Platform: | Size: 2117632 | Author: mali | Hits:

[Education soft systemIntrusion-Detection-System-master

Description: Intrusion Detection for network security
Platform: | Size: 138240 | Author: aquablue | Hits:
« 12 3 4 5 6 7 8 9 10 ... 15 »

CodeBus www.codebus.net