General study of intrusion detection system and survey of agent based intrusion detection system

AK Saxena, S Sinha, P Shukla - 2017 International conference …, 2017 - ieeexplore.ieee.org
In today's world one of the most severe threat to computer security is the illegal intrusion into
a computer system. As the network applications are growing rapidly, new sort of network …

[PDF][PDF] An agent based distributed security system for intrusion detection in computer networks

A Saxena, AK Sharma - Int. J. Comput. Appl., 2010 - Citeseer
Intruders damage or steal valuable information by either bypassing security tools or
penetrating through them, necessitating the need to detect such intrusion attempts …

[PDF][PDF] Internal Security on an IDS based on agents

R Páez, MY Uribe, M Torres - … Journal of Network Security & Its …, 2013 - researchgate.net
ABSTRACT An Intrusion Detection System (IDS) can monitor different events that may occur
in a determined network or host, and which affect any network security service …

An Auto-Reclosing-Based Intrusion Detection Technique for Enterprise Networks

NK Ampah, CM Akujuobi - Handbook of Research on Emerging …, 2015 - igi-global.com
Designing, planning, and managing telecommunication, industrial control, and enterprise
networks with special emphasis on effectiveness, efficiency, and reliability without …

Protecting enterprise networks: An intrusion detection technique based on auto-reclosing

NK Ampah, CM Akujuobi - Privacy, intrusion detection and response …, 2012 - igi-global.com
Our new IDS, which employs both signature-based and anomaly detection as its analysis
strategies, will be able to detect both known and unknown attacks and further isolate them …

[PDF][PDF] MAESTRÍA EN INGENIERÍA DE SISTEMAS Y COMPUTACIÓN BOGOTÁ, DC 2019

ACF de Andrade - core.ac.uk
El IoT está permitiendo el uso de dispositivos para recopilar nuevos tipos de datos sobre el
mundo físico, pero el aumento de estos, también ha incrementado los ataques y …

An Intrusion Detection Technique Based on Discrete Binary Communication Channels

NK Ampah, CM Akujuobi… - Intrusion Detection …, 2011 - books.google.com
Enterprise networks are the main targets for hackers or intruders due to the fact that most
financial transactions take place online and the networks also handle vast amounts of data …

Intrusion Detection System: Principles, Taxonomy, Challenges and Generic Model

HH Jebur, WJ Al-Nidawi… - … of Computational and …, 2019 - ingentaconnect.com
Intrusion detection systems are being received a growing interest by researchers to develop
different methods and techniques to overcome their problems and improve the efficiency in …

[PDF][PDF] Agent Security Techniques, Deployment and Evaluation on an Intrusion Detection System

R Páez, Y Uribe, M Torres - researchgate.net
Mobile agents have had inherent security drawbacks, and one the most difficult problems to
face is related to attacks from a malicious host against the mobile agent. An untrustworthy …

[PDF][PDF] INTRUSION DETECTION SYSTEM USING DYNAMIC AGENT SELECTION AND CONFIGURATION

M Kumar, M Hanumanthappa - … Journal of Advances in Engineering & …, 2014 - academia.edu
Intrusion detection is the process of monitoring the events occurring in a computer system or
network and analysing them for signs of possible incidents, which are violations or imminent …