[图书][B] The state of the art in intrusion prevention and detection

ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …

Dynamic identification and administration of networked clients

JB Hove, EJD Harris, DA Pickett - US Patent 7,568,018, 2009 - Google Patents
The present inventive subject matter relates to networked computing environments and
more specifically to dynamic identification and administration of networked clients. Various …

Multi-agent reinforcement learning for intrusion detection

A Servin, D Kudenko - European Symposium on Adaptive Agents and …, 2005 - Springer
Abstract Intrusion Detection Systems (IDS) have been investigated for many years and the
field has matured. Nevertheless, there are still important challenges, eg, how an IDS can …

Analysis of the self-excited induction generator steady state performance using a new efficient algorithm

A Kheldoun, L Refoufi, DE Khodja - Electric Power Systems Research, 2012 - Elsevier
The paper presents the application of DIRECT algorithm to analyse the performance of the
Self-excited induction generator (SEIG). To the author best knowledge, this is the first …

Proactive intrusion detection and distributed denial of service attacks—a case study in security management

JBD Cabrera, L Lewis, X Qin, W Lee… - Journal of Network and …, 2002 - Springer
Little or no integration exists today between Intrusion Detection Systems (IDSs) and SNMP-
based Network Management Systems (NMSs), in spite of the extensive monitoring and …

An agent-based intrusion detection system for local area networks

J Sen - arXiv preprint arXiv:1011.1531, 2010 - arxiv.org
Since it is impossible to predict and identify all the vulnerabilities of a network beforehand,
and penetration into a system by malicious intruders cannot always be prevented, intrusion …

Infrastructures and algorithms for distributed anomaly-based intrusion detection in mobile ad-hoc networks

JBD Cabrera, C Gutierrez… - MILCOM 2005-2005 IEEE …, 2005 - ieeexplore.ieee.org
This paper addresses one aspect of the problem of defending mobile ad-hoc networks
(MANETs) against computer attacks, namely, the development of a distributed anomaly …

Policy management for network-based intrusion detection and prevention

YM Chen, Y Yang - 2004 IEEE/IFIP Network Operations and …, 2004 - ieeexplore.ieee.org
Intrusion detection and prevention systems are becoming an essential part of network
infrastructure. They provide the ability to detect intrusion signatures or discover abnormal …

[PDF][PDF] Application of Belief-Desire-Intention Agents in Intrusion Detection & Response.

M Shajari, AA Ghorbani - PST, 2004 - researchgate.net
Current intrusion detection technologies have several major shortcomings. Using intelligent
agents for intrusion detection and response is expected to improve the current status of the …

The hurst parameter for digital signature of network segment

ML Proença, C Coppelmans, M Bottoli, A Alberti… - … and Networking-ICT …, 2004 - Springer
This paper presents results of the Hurst parameter for digital signature of network segments.
It's also presented a model for digital signature automatic generation which aims at the …