Поиск по каталогу |
(строгое соответствие)
|
- Профессиональная
- Научно-популярная
- Художественная
- Публицистика
- Детская
- Искусство
- Хобби, семья, дом
- Спорт
- Путеводители
- Блокноты, тетради, открытки
Intrusion Detection System using datamining techniques. Parallel Approaches Using WEKA Tool
В наличии
Местонахождение: Алматы | Состояние экземпляра: новый |
Бумажная
версия
версия
Автор: Shubha Puthran and Ketan Shah
ISBN: 9783847378716
Год издания: 2012
Формат книги: 60×90/16 (145×215 мм)
Количество страниц: 76
Издательство: LAP LAMBERT Academic Publishing
Цена: 30358 тг
Положить в корзину
Позиции в рубрикаторе
Отрасли знаний:Код товара: 488838
Способы доставки в город Алматы * комплектация (срок до отгрузки) не более 2 рабочих дней |
Самовывоз из города Алматы (пункты самовывоза партнёра CDEK) |
Курьерская доставка CDEK из города Москва |
Доставка Почтой России из города Москва |
Аннотация: Security is a big issue for all networks including defense and government infrastructure. Attacks on network infrastructure are threats against the information security. The Intrusion detection system (IDS) is one that scans incoming data activities and attempt to detect the intrusions. The classification algorithms in IDS are used to categorize the well known large variety of intrusions. In recent years, data mining based IDS have executed good performance. Still challenges exist in the design and implementation of quality IDSs. The goal of this classification and clustering based IDS system is to decrease the False alarm rates and increase the accuracy.
Ключевые слова: intrusion detection, Data Mining
Похожие издания
Junior Momo Ziazet Intrusion Detection System based on deep learning.. 2023 г., 108 стр., мягкий переплет This work focuses on the development of a new approach based on deep learning to implement an efficient and flexible intrusion detection system using the behavioral approach and mainly intended for critical infrastructures and industrial control systems. Based on the assumption that modeling the normal network behavior of industrial control... | 38312 тг | |
Ruth Mweni Kabamba and Francis ALONGA Study and installation of an intrusion detection system. The case of the DGDA/Kisangani LAN. 2023 г., 96 стр., мягкий переплет The present study focuses on the implementation of an intrusion detection system in the local network of a DGDA/Tshopo company. The main problem addressed in this work is the security of DGDA/Tshopo's local network. To solve this problem, we used the following methods: historical, structural-functional, UP and PERT, which enabled us to implement... | 37357 тг | |
Poonam Choubey,Priyanka Soni and Sneha Sule Intrusion Detection System Using MANET.. 2024 г., 64 стр., мягкий переплет The Remote framework is obtaining clear quality on account of its movability supported game plans and access phase. Among distinctive frameworks focused around remote advances, convenient impermanent framework is perceived as a possible space of labor. Here the guiding technique is forbidden with by center points itself, thus the traditions made... | 27237 тг | |
Kanimozhi D and Nathiya V C INTRUSION DETECTION SYSTEM. INTRUSION DETECTION WHILE ACCESSING LOGDATA FILES IN CLOUD DATALAKEARCHITECTURE. 2024 г., 92 стр., мягкий переплет Software-Defined Networks (SDN) offer enhanced network management and control, but also introduce new security vulnerabilities. This book presents a comprehensive approach for intrusion detection in SDN environments, combining Elliptic Curve Cryptography (ECC) for secure data transmission with a hybrid machine learning model for accurate attack... | 37215 тг | |
Отрасли экономики: Промышленность в целом Palanichamy Sudha Intrusion Detection in Big Data Environment. PROFICIENT INTRUSION DETECTION SYSTEM USING MAP REDUCE BASED DEEP LEARNING IN BIG DATA ENVIRONMENT. 1905 г., 236 стр., мягкий переплет Nowadays, information system management, large-scale data-clustering and classification have become increasingly important and a challenging area. While several tools and methods have been proposed, few of them are sufficient and efficient enough for real applications due to the rapid growing-in-size and high-dimensional data inputs. Intrusion in... | 55011 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование Amirhossein Abdi Evaluation of Machine Learning Classification Techniques in IDS. An exhaustive survey on the performance of the top four machine learning classifiers in the intrusion detection system. 1905 г., 100 стр., мягкий переплет With the rapid development of information technology, computer networks are exposed to a wide variety of vulnerabilities and an increasing number of security threats. Intrusive traffics affects the normal functionality of the network’s operation. Thus, a need for more intelligent and sophisticated security controls such as intrusion detection... | 37499 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Swati Patel Intrusion Detection System for Wireless Sensor Networks. . 2020 г., 108 стр., мягкий переплет Security of Wireless sensor network (WSN) becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources. Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. A particularly... | 34613 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Janakiraman S. Distributed Intrusion Detection System. An Evolutionary Computing Approach. 2012 г., 164 стр., мягкий переплет This book offers a detailed comparative study on Intelligent Agents-based Distributed Intrusion Detection System (IADIDS) with a fresh research approach. An Intelligent Agent architecture supported by the Evolutionary Computing based technique is proposed for intrusion detection to optimize Distributed Intrusion Detection System (DIDS). The... | 43524 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Mohammad S. I. Mamun Intrusion Detection System Architecture in Wireless Sensor Network. HOD based IDS for WSN. 2012 г., 76 стр., мягкий переплет Wireless sensor network becomes popular both in civil and military jobs. Security is one of the significant challenges for wireless sensor networks because of their deployment in open and unprotected environment. As cryptographic mechanisms are not enough to protect wireless sensor networks from external attacks, intrusion detection system (IDS)... | 30358 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Abhay Nath Singh Honeypot Based Intrusion Detection System. A framework for mitigating network attacks using honeypot and real time rule accession in Intrusion Detection System. 2012 г., 68 стр., мягкий переплет The Intrusion Detection Systems (IDS) play an important role in protecting the organizations from unauthorized activities. In this dissertation work, a framework using honeypot is proposed with Real Time Rule Accession (ReTRA) capability. Honeypot is used to prevent the attack and collect attack traffic on the network. Furthermore, Apriori... | 30074 тг | |
Отрасли знаний: Общественные науки M. Sadiq Ali Khan and S. M. Aqil Burney Recent Trends in Intrusion Detection System & Network Monitoring. A Statistical Modeling Approach 3-Tier Network Intrusion Detection Model (3-T NIDM). 2012 г., 120 стр., мягкий переплет In the age of information and communication technology, network models centralized or distributed systems are the good way to connect the user with a single platform.However,when such model and systems are implemented, different types of threat from system surrounding and from the boundary of a system are faced.Therefore we need to introduce new... | 31921 тг | |
Отрасли знаний: Общественные науки -> Экономика Chibuzor John Ugochukwu An intrusion detection system using machine learning algorithm. . 2019 г., 76 стр., мягкий переплет Security of data in a network-based computer system has become a major challenge in the world today. With the high increase of network traffic, hackers and malicious users are devising new ways of breaking into computer networks. In other to tackle this problem, an intrusion detection system (IDS) is developed to control access and detect attacks... | 25550 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование Pradeep Laxkar and Prasun Chakrabarti Intrusion Detection System Using SPARK'S Machine Learning Library. Secure your network. 2018 г., 92 стр., мягкий переплет Now a day’s computer network security problems play a pivotal role. The network is vulnerable towards attacks like DOS, U2R, R2L etc. These attacks take advantage of a network vulnerability to gain illegal access to important information or sometimes create a flood to prevent genuine users from accessing it. Network attackers use massive volume... | 34044 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование Wathiq Laftah Al-Yaseen Multiagent System for an Adaptive Real Time Intrusion Detection System. . 2018 г., 272 стр., мягкий переплет The increased speed of network data traffic and growing number of attacks on computer networks have become challenges for an intrusion detection system’s (IDS) such as long processing time, low detection rates and adaptively on new attacks. Most researches attempted to overcome the obstacles by improving the algorithm or improving the IDS’s... | 55233 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Akbar Shaik Enhanced Intrusion Detection System Using Machine Learning Techniques. . 2017 г., 164 стр., мягкий переплет This book provides a machine learning technique was proposed to identify the network attacks. IDS is an important technology that monitors the network traffic and identifies the network intrusions. The primary objective of this rule based intrusion detection system detects the errors with high detection rate and low false alarm rate. This book... | 41885 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Vishal Badgujar and Sudhir Dhage Intrusion Detection System in Wireless Sensor Network. Comparison of Different IDS Schemes. 2017 г., 64 стр., мягкий переплет A Wireless Network consist of Wireless Sensor Network and wireless Ad-hoc Network, WSN composed of hundreds or even thousands of small cheap sensor nodes which communicate with one another wirelessly. In Wireless Ad-hoc Network mobile nodes moving arbitrary in the places that have no network infrastructure, hence they are easily vulnerable to... | 23010 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Imdadul Karim and Quoc-Tuan Vien Snort-based Intrusion Detection System for Practical Computer Networks. Implementation and Comparative Study. 2017 г., 132 стр., мягкий переплет A significant amount of research has been done to evaluate the performance of Network Intrusion Detection System (NIDS). Most of the works were performed in a moderate traffic condition. It is not worth enough to analyse the NIDS performance based on non-realistic traffic flow and under limited conditions. In this project, authors introduce some... | 35994 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Diyar Salah Fadhil and Samir Al-Khayatt Automatic Intrusion Prevention Technique to Improve Network Security. Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Firewall to secure the network. 2016 г., 76 стр., мягкий переплет Some of the important tools are considered against attacks from hacker’s such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Firewall to secure the network. Ironically, more adverse effects on the network have brought by these malicious attacks than before. At present, Both IDS and IPS do not support information... | 23436 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Sandip Sonawane Automatically Tuning Intrusion Detection System (ATIDS). . 2016 г., 80 стр., мягкий переплет Automatically Tuning Intrusion Detection System (ATIDS) makes tuning automatically. The key idea is to use the binary SLIPPER as a basic module, which is a rule learner based on confidence-rated boosting. This system is evaluated using the NSL KDD intrusion detection dataset. An experimental result shows the SCIDS system with SLIPPER algorithm... | 28862 тг | |
Сферы деятельности: Предпринимательская деятельность -> Менеджмент Sandip Sonawane Self Configuring Intrusion Detection System (SCIDS). . 2016 г., 80 стр., мягкий переплет With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to identify malicious use is through monitoring unusual user activity. To identify these malicious activities various data-mining and machine learning techniques have been deployed for intrusion... | 23578 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование Fadwa Awn Performance Study of Intrusion Detection Systems. . 2016 г., 108 стр., мягкий переплет Information security becomes a major issue in the recent decade due to wide spread of the network and Internet that consider as insecure transmission media, from this point of view security participants focus their effort to provide best method implementing information security, one of these methods is Intrusion Detection System (IDS). IDS is a... | 34613 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Abdullah Mohamed and Dia Ali Network Intrusion Detection System Based on Embedded System. Off-line and On-line NIDS Based on Embedded System: Design and Implementation. 2016 г., 104 стр., мягкий переплет This research is a new attempt in the NIDS designing methods. Off-line NIDS is designed and then developed to an on-line NIDS. The required tools and sub-systems for developing the off-line to on-line NIDS are built: Tapping system, Real-time Operation System (RTOS) and the Packet Feature Extractor (PFE). The attempt succeeded and gave a good... | 34471 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование Bibi Masoomeh Aslahi Shahri Intrusion Detection System Using Hybrid Gsa-kmeans. . 2014 г., 128 стр., мягкий переплет Security is an important aspect in our daily life. Intrusion Detection Systems (IDS) are developed to be the defense against security threats. Current signature based IDS like firewalls and antiviruses, which rely on labeled training data, generally cannot detect novel attacks. The purpose of this study is to improve the performance of IDS in... | 39022 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Аппаратное обеспечение Govind Sreekar Shenoy Architecture Support for Intrusion Detection systems. Hardware and Software techniques to improve the performance and area efficiency of an IDS. 2014 г., 160 стр., мягкий переплет System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet... | 34874 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Heba Fathy Eid Computational Intelligence in Network Intrusion Detection System. . 2014 г., 164 стр., мягкий переплет This book objectives is to outline the idea of network intruder discovery in Intrusion detection system (IDS). It presents a solution to the problem challenges of data dimension and detection of network intrusions. The solution described in book can be summarized into two direction:(1) Proposing four hybrid anomaly Network intrusion detection... | 49813 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Nasim Beigi-Mohammadi Smart Meter Networks: Intrusion Detection System by Design. . 2014 г., 136 стр., мягкий переплет Smart grid is expected to improve the efficiency, reliability and economics of current energy systems. Using two-way flow of energy and information, smart grid builds an automated, highly distributed energy delivery network. In this book, the requirements for intrusion detection systems in smart grid, neighborhood area network (NAN) in particular,... | 39306 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Yogesh Kumar,Krishan Kumar and Gulshan Kumar Feature Selection For Intrusion Detection Systems. Using data mining techniques. 2014 г., 100 стр., мягкий переплет Network security is a serious global concern. The increasing prevalence of malware and incidents of attacks hinders the utilization of the Internet to its greatest benefit and incur significant economic losses. The traditional approaches in securing systems against threats are designing mechanisms that create a protective shield, almost always... | 34328 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar Network Intrusion Detection System using Machine Learning Techniques. A Quick Reference. 2013 г., 80 стр., мягкий переплет This book presents the need for intrusion detection system as it has become an essential concern with the growing use of internet and increased network attacks such as virus, Trojan horse, worms and creative hackers. In addition, the basic details about the historic origin of IDS, the types of IDS, their deployment schemes and general architecture... | 25692 тг |