Description: 一个开放源码的高级NIDS系统 目前最著名最活跃的开放源码NIDS项目,定位于轻量级的入侵检测系统-an open source system is currently senior NIDS most famous of the most active open source projects NIDS, located in the lightweight Intrusion Detection System Platform: |
Size: 7168 |
Author:浪天 |
Hits:
Description: 网络入侵检测系统,属于本人毕业设计的一部分,希望大家指正-network intrusion detection system, belonging to my graduation part of the design, we hope that the correction Platform: |
Size: 11264 |
Author: |
Hits:
Description: 文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,针对成簇ad hoc网络提出了一种基于移动代理的入侵监测系统结构-described in the text intrusion detection technology on the basis of relevant content to mobile agent technology into Intrusion Detection System Clustered against ad hoc network of a mobile agent-based Intrusion Detection System Platform: |
Size: 100352 |
Author:joe |
Hits:
Description: 本文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,提出了一种基于移动代理的入侵监测系统结构-Based on the intrusion detection technology on the basis of content, Mobile Agent technology will be the introduction of Intrusion Detection System, a Mobile Agent Based Intrusion Detection System Platform: |
Size: 5769216 |
Author:joe |
Hits:
Description:
针对DIDS网络提出了一种基于移动代理的入侵监测系统结构-against DIDS network presents a Mobile Agent Based Intrusion Detection System Platform: |
Size: 6144 |
Author:joe |
Hits:
Description: 加入了ac_bm匹配并完成了部分界面,还有部分功能有待实现的网络入侵检测系统-joined the ac_bm match and completed a part of the interface, there are some functions to be achieved Network Intrusion Detection System Platform: |
Size: 930816 |
Author:yu |
Hits:
Description: 网络入侵检测系统的原代码,是对snort的进一步改进和完善-Network Intrusion Detection System s original code, is a snort of further improvement and refinement Platform: |
Size: 2241536 |
Author:laizhengwen |
Hits:
Description: 一个商业版入侵检测系统的核心代码!非常强大,绝对你吸引你!-A commercial version of intrusion detection system s core code! Very powerful, you definitely attract you! Platform: |
Size: 160768 |
Author:Shi |
Hits:
Description: 网络入侵检测系统,还需完善,有源代码,能分析数据包-Network intrusion detection system needs to be perfect, active code, capable of analyzing packet Platform: |
Size: 2257920 |
Author:lilang |
Hits:
Description: 入侵检测系统源码分析,3. 能够分析数据包,甚至能够对系统日志进行检测和分析。-Intrusion Detection System source code analysis, 3. Be able to analyze the data packets, and can even log on the system testing and analysis. Platform: |
Size: 2245632 |
Author:江尘封 |
Hits:
Description: Recently, information security has become a key issue
in information technology as the number of computer security
breaches are exposed to an increasing number of security threats. A
variety of intrusion detection systems (IDS) have been employed for
protecting computers and networks from malicious network-based or
host-based attacks by using traditional statistical methods to new data
mining approaches in last decades. However, today s commercially
available intrusion detection systems are signature-based that are not
capable of detecting unknown attacks. In this paper, we present a
new learning algorithm for anomaly based network intrusion
detection system using decision tree algorithm that distinguishes
attacks from normal behaviors and identifies different types of
intrusions. Experimental results on the KDD99 benchmark network
intrusion detection dataset demonstrate that the proposed learning
algorithm achieved 98 detection rate (DR) in comparison with
other existing methods.-Recently, information security has become a key issue
in information technology as the number of computer security
breaches are exposed to an increasing number of security threats. A
variety of intrusion detection systems (IDS) have been employed for
protecting computers and networks from malicious network-based or
host-based attacks by using traditional statistical methods to new data
mining approaches in last decades. However, today s commercially
available intrusion detection systems are signature-based that are not
capable of detecting unknown attacks. In this paper, we present a
new learning algorithm for anomaly based network intrusion
detection system using decision tree algorithm that distinguishes
attacks from normal behaviors and identifies different types of
intrusions. Experimental results on the KDD99 benchmark network
intrusion detection dataset demonstrate that the proposed learning
algorithm achieved 98 detection rate (DR) in comparison with
other existing methods. Platform: |
Size: 312320 |
Author:keerthi |
Hits:
Description: There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in
form of software deployed on a host, the latter, usually is built as a
hardware product with its own hardware platform (IDS appliance).
In this paper, a host based intrusion detection system, that uses the
idea of tracing system calls, is introduced. As a program runs, it
uses the services of the underlying operating system to do some
system calls. This system does not exactly need to know the
program codes of each process. Normal and intrusive behaviors are
collected with gathering the sequences of system calls for each
process. Analysis of data is done via data mining and fuzzy
techniques. Data mining is used to extract normal behaviors
(normal unique rules) and Fuzzy to enhance intelligence of the
System. The proposed system is shown to improve the
performance, and decrease size of database, time complexity, and
rate of false alarms.-There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in
form of software deployed on a host, the latter, usually is built as a
hardware product with its own hardware platform (IDS appliance).
In this paper, a host based intrusion detection system, that uses the
idea of tracing system calls, is introduced. As a program runs, it
uses the services of the underlying operating system to do some
system calls. This system does not exactly need to know the
program codes of each process. Normal and intrusive behaviors are
collected with gathering the sequences of system calls for each
process. Analysis of data is done via data mining and fuzzy
techniques. Data mining is used to extract normal behaviors
(normal unique rules) and Fuzzy to enhance intelligence of the
System. The proposed system is shown to improve the
performance, and decrease size of database, time complexity, and
rate of false alarms. Platform: |
Size: 710656 |
Author:keerthi |
Hits:
Description: 本文详细介绍了BP神经网络在入侵检测系统中的应用及优化。-This paper describes the application and optimization of the BP neural network intrusion detection system. Platform: |
Size: 2117632 |
Author:mali |
Hits: