Ваш любимый книжный интернет-магазин
Перейти на
GlavKniga.SU
Ваш город: Алматы
Ваше местоположение – Алматы
 Да 
От вашего выбора зависит время и стоимость доставки
Корзина: пуста
Авторизация 
  Логин
  
  Пароль
  
Регистрация  Забыли пароль?

Поиск по каталогу 
(строгое соответствие)
ISBN
Фраза в названии или аннотации
Автор
Язык книги
Год издания
с по
Электронный носитель
Тип издания
Вид издания
Отрасли экономики
Отрасли знаний
Сферы деятельности
Надотраслевые технологии
Разделы каталога
худ. литературы

Intrusion Detection System Architecture in Wireless Sensor Network. HOD based IDS for WSN

В наличии
Местонахождение: АлматыСостояние экземпляра: новый
Бумажная
версия
Автор: Mohammad S. I. Mamun
ISBN: 9783848439652
Год издания: 2012
Формат книги: 60×90/16 (145×215 мм)
Количество страниц: 76
Издательство: LAP LAMBERT Academic Publishing
Цена: 30358 тг
Положить в корзину
Позиции в рубрикаторе
Отрасли знаний:
Код товара: 480547
Способы доставки в город Алматы *
комплектация (срок до отгрузки) не более 2 рабочих дней
Самовывоз из города Алматы (пункты самовывоза партнёра CDEK)
Курьерская доставка CDEK из города Москва
Доставка Почтой России из города Москва
      Аннотация: Wireless sensor network becomes popular both in civil and military jobs. Security is one of the significant challenges for wireless sensor networks because of their deployment in open and unprotected environment. As cryptographic mechanisms are not enough to protect wireless sensor networks from external attacks, intrusion detection system (IDS) needs to be introduced. In this book a policy based IDS is proposed that fits the current demands and restrictions of wireless ad hoc sensor network.
Ключевые слова: Wireless Sensor Network, Intrusion Detection System, Hierarchical Architecture
Похожие издания
Junior Momo Ziazet
Intrusion Detection System based on deep learning..
2023 г.,  108 стр.,  мягкий переплет
This work focuses on the development of a new approach based on deep learning to implement an efficient and flexible intrusion detection system using the behavioral approach and mainly intended for critical infrastructures and industrial control systems. Based on the assumption that modeling the normal network behavior of industrial control...

38312 тг
Бумажная версия
Ruth Mweni Kabamba and Francis ALONGA
Study and installation of an intrusion detection system. The case of the DGDA/Kisangani LAN.
2023 г.,  96 стр.,  мягкий переплет
The present study focuses on the implementation of an intrusion detection system in the local network of a DGDA/Tshopo company. The main problem addressed in this work is the security of DGDA/Tshopo's local network. To solve this problem, we used the following methods: historical, structural-functional, UP and PERT, which enabled us to implement...

37357 тг
Бумажная версия
Poonam Choubey,Priyanka Soni and Sneha Sule
Intrusion Detection System Using MANET..
2024 г.,  64 стр.,  мягкий переплет
The Remote framework is obtaining clear quality on account of its movability supported game plans and access phase. Among distinctive frameworks focused around remote advances, convenient impermanent framework is perceived as a possible space of labor. Here the guiding technique is forbidden with by center points itself, thus the traditions made...

27237 тг
Бумажная версия
Kanimozhi D and Nathiya V C
INTRUSION DETECTION SYSTEM. INTRUSION DETECTION WHILE ACCESSING LOGDATA FILES IN CLOUD DATALAKEARCHITECTURE.
2024 г.,  92 стр.,  мягкий переплет
Software-Defined Networks (SDN) offer enhanced network management and control, but also introduce new security vulnerabilities. This book presents a comprehensive approach for intrusion detection in SDN environments, combining Elliptic Curve Cryptography (ECC) for secure data transmission with a hybrid machine learning model for accurate attack...

37215 тг
Бумажная версия
Отрасли экономики: Промышленность в целом
Palanichamy Sudha
Intrusion Detection in Big Data Environment. PROFICIENT INTRUSION DETECTION SYSTEM USING MAP REDUCE BASED DEEP LEARNING IN BIG DATA ENVIRONMENT.
1905 г.,  236 стр.,  мягкий переплет
Nowadays, information system management, large-scale data-clustering and classification have become increasingly important and a challenging area. While several tools and methods have been proposed, few of them are sufficient and efficient enough for real applications due to the rapid growing-in-size and high-dimensional data inputs. Intrusion in...

55011 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование
Amirhossein Abdi
Evaluation of Machine Learning Classification Techniques in IDS. An exhaustive survey on the performance of the top four machine learning classifiers in the intrusion detection system.
1905 г.,  100 стр.,  мягкий переплет
With the rapid development of information technology, computer networks are exposed to a wide variety of vulnerabilities and an increasing number of security threats. Intrusive traffics affects the normal functionality of the network’s operation. Thus, a need for more intelligent and sophisticated security controls such as intrusion detection...

37499 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Swati Patel
Intrusion Detection System for Wireless Sensor Networks. .
2020 г.,  108 стр.,  мягкий переплет
Security of Wireless sensor network (WSN) becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources. Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. A particularly...

34613 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Shubha Puthran and Ketan Shah
Intrusion Detection System using datamining techniques. Parallel Approaches Using WEKA Tool.
2012 г.,  76 стр.,  мягкий переплет
Security is a big issue for all networks including defense and government infrastructure. Attacks on network infrastructure are threats against the information security. The Intrusion detection system (IDS) is one that scans incoming data activities and attempt to detect the intrusions. The classification algorithms in IDS are used to...

30358 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Janakiraman S.
Distributed Intrusion Detection System. An Evolutionary Computing Approach.
2012 г.,  164 стр.,  мягкий переплет
This book offers a detailed comparative study on Intelligent Agents-based Distributed Intrusion Detection System (IADIDS) with a fresh research approach. An Intelligent Agent architecture supported by the Evolutionary Computing based technique is proposed for intrusion detection to optimize Distributed Intrusion Detection System (DIDS). The...

43524 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Abhay Nath Singh
Honeypot Based Intrusion Detection System. A framework for mitigating network attacks using honeypot and real time rule accession in Intrusion Detection System.
2012 г.,  68 стр.,  мягкий переплет
The Intrusion Detection Systems (IDS) play an important role in protecting the organizations from unauthorized activities. In this dissertation work, a framework using honeypot is proposed with Real Time Rule Accession (ReTRA) capability. Honeypot is used to prevent the attack and collect attack traffic on the network. Furthermore, Apriori...

30074 тг
Бумажная версия
Отрасли знаний: Общественные науки
M. Sadiq Ali Khan and S. M. Aqil Burney
Recent Trends in Intrusion Detection System & Network Monitoring. A Statistical Modeling Approach 3-Tier Network Intrusion Detection Model (3-T NIDM).
2012 г.,  120 стр.,  мягкий переплет
In the age of information and communication technology, network models centralized or distributed systems are the good way to connect the user with a single platform.However,when such model and systems are implemented, different types of threat from system surrounding and from the boundary of a system are faced.Therefore we need to introduce new...

31921 тг
Бумажная версия
Отрасли знаний: Общественные науки -> Экономика
Chibuzor John Ugochukwu
An intrusion detection system using machine learning algorithm. .
2019 г.,  76 стр.,  мягкий переплет
Security of data in a network-based computer system has become a major challenge in the world today. With the high increase of network traffic, hackers and malicious users are devising new ways of breaking into computer networks. In other to tackle this problem, an intrusion detection system (IDS) is developed to control access and detect attacks...

25550 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование
Pradeep Laxkar and Prasun Chakrabarti
Intrusion Detection System Using SPARK'S Machine Learning Library. Secure your network.
2018 г.,  92 стр.,  мягкий переплет
Now a day’s computer network security problems play a pivotal role. The network is vulnerable towards attacks like DOS, U2R, R2L etc. These attacks take advantage of a network vulnerability to gain illegal access to important information or sometimes create a flood to prevent genuine users from accessing it. Network attackers use massive volume...

34044 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование
Wathiq Laftah Al-Yaseen
Multiagent System for an Adaptive Real Time Intrusion Detection System. .
2018 г.,  272 стр.,  мягкий переплет
The increased speed of network data traffic and growing number of attacks on computer networks have become challenges for an intrusion detection system’s (IDS) such as long processing time, low detection rates and adaptively on new attacks. Most researches attempted to overcome the obstacles by improving the algorithm or improving the IDS’s...

55233 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Akbar Shaik
Enhanced Intrusion Detection System Using Machine Learning Techniques. .
2017 г.,  164 стр.,  мягкий переплет
This book provides a machine learning technique was proposed to identify the network attacks. IDS is an important technology that monitors the network traffic and identifies the network intrusions. The primary objective of this rule based intrusion detection system detects the errors with high detection rate and low false alarm rate. This book...

41885 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Vishal Badgujar and Sudhir Dhage
Intrusion Detection System in Wireless Sensor Network. Comparison of Different IDS Schemes.
2017 г.,  64 стр.,  мягкий переплет
A Wireless Network consist of Wireless Sensor Network and wireless Ad-hoc Network, WSN composed of hundreds or even thousands of small cheap sensor nodes which communicate with one another wirelessly. In Wireless Ad-hoc Network mobile nodes moving arbitrary in the places that have no network infrastructure, hence they are easily vulnerable to...

23010 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Imdadul Karim and Quoc-Tuan Vien
Snort-based Intrusion Detection System for Practical Computer Networks. Implementation and Comparative Study.
2017 г.,  132 стр.,  мягкий переплет
A significant amount of research has been done to evaluate the performance of Network Intrusion Detection System (NIDS). Most of the works were performed in a moderate traffic condition. It is not worth enough to analyse the NIDS performance based on non-realistic traffic flow and under limited conditions. In this project, authors introduce some...

35994 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Diyar Salah Fadhil and Samir Al-Khayatt
Automatic Intrusion Prevention Technique to Improve Network Security. Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Firewall to secure the network.
2016 г.,  76 стр.,  мягкий переплет
Some of the important tools are considered against attacks from hacker’s such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Firewall to secure the network. Ironically, more adverse effects on the network have brought by these malicious attacks than before. At present, Both IDS and IPS do not support information...

23436 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Sandip Sonawane
Automatically Tuning Intrusion Detection System (ATIDS). .
2016 г.,  80 стр.,  мягкий переплет
Automatically Tuning Intrusion Detection System (ATIDS) makes tuning automatically. The key idea is to use the binary SLIPPER as a basic module, which is a rule learner based on confidence-rated boosting. This system is evaluated using the NSL KDD intrusion detection dataset. An experimental result shows the SCIDS system with SLIPPER algorithm...

28862 тг
Бумажная версия
Сферы деятельности: Предпринимательская деятельность -> Менеджмент
Sandip Sonawane
Self Configuring Intrusion Detection System (SCIDS). .
2016 г.,  80 стр.,  мягкий переплет
With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to identify malicious use is through monitoring unusual user activity. To identify these malicious activities various data-mining and machine learning techniques have been deployed for intrusion...

23578 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование
Fadwa Awn
Performance Study of Intrusion Detection Systems. .
2016 г.,  108 стр.,  мягкий переплет
Information security becomes a major issue in the recent decade due to wide spread of the network and Internet that consider as insecure transmission media, from this point of view security participants focus their effort to provide best method implementing information security, one of these methods is Intrusion Detection System (IDS). IDS is a...

34613 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Abdullah Mohamed and Dia Ali
Network Intrusion Detection System Based on Embedded System. Off-line and On-line NIDS Based on Embedded System: Design and Implementation.
2016 г.,  104 стр.,  мягкий переплет
This research is a new attempt in the NIDS designing methods. Off-line NIDS is designed and then developed to an on-line NIDS. The required tools and sub-systems for developing the off-line to on-line NIDS are built: Tapping system, Real-time Operation System (RTOS) and the Packet Feature Extractor (PFE). The attempt succeeded and gave a good...

34471 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование
Bibi Masoomeh Aslahi Shahri
Intrusion Detection System Using Hybrid Gsa-kmeans. .
2014 г.,  128 стр.,  мягкий переплет
Security is an important aspect in our daily life. Intrusion Detection Systems (IDS) are developed to be the defense against security threats. Current signature based IDS like firewalls and antiviruses, which rely on labeled training data, generally cannot detect novel attacks. The purpose of this study is to improve the performance of IDS in...

39022 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Аппаратное обеспечение
Govind Sreekar Shenoy
Architecture Support for Intrusion Detection systems. Hardware and Software techniques to improve the performance and area efficiency of an IDS.
2014 г.,  160 стр.,  мягкий переплет
System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet...

34874 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Heba Fathy Eid
Computational Intelligence in Network Intrusion Detection System. .
2014 г.,  164 стр.,  мягкий переплет
This book objectives is to outline the idea of network intruder discovery in Intrusion detection system (IDS). It presents a solution to the problem challenges of data dimension and detection of network intrusions. The solution described in book can be summarized into two direction:(1) Proposing four hybrid anomaly Network intrusion detection...

49813 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Nasim Beigi-Mohammadi
Smart Meter Networks: Intrusion Detection System by Design. .
2014 г.,  136 стр.,  мягкий переплет
Smart grid is expected to improve the efficiency, reliability and economics of current energy systems. Using two-way flow of energy and information, smart grid builds an automated, highly distributed energy delivery network. In this book, the requirements for intrusion detection systems in smart grid, neighborhood area network (NAN) in particular,...

39306 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Yogesh Kumar,Krishan Kumar and Gulshan Kumar
Feature Selection For Intrusion Detection Systems. Using data mining techniques.
2014 г.,  100 стр.,  мягкий переплет
Network security is a serious global concern. The increasing prevalence of malware and incidents of attacks hinders the utilization of the Internet to its greatest benefit and incur significant economic losses. The traditional approaches in securing systems against threats are designing mechanisms that create a protective shield, almost always...

34328 тг
Бумажная версия
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети
Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar
Network Intrusion Detection System using Machine Learning Techniques. A Quick Reference.
2013 г.,  80 стр.,  мягкий переплет
This book presents the need for intrusion detection system as it has become an essential concern with the growing use of internet and increased network attacks such as virus, Trojan horse, worms and creative hackers. In addition, the basic details about the historic origin of IDS, the types of IDS, their deployment schemes and general architecture...

25692 тг
Бумажная версия