Поиск по каталогу |
(строгое соответствие)
|
- Профессиональная
- Научно-популярная
- Художественная
- Публицистика
- Детская
- Искусство
- Хобби, семья, дом
- Спорт
- Путеводители
- Блокноты, тетради, открытки
Intrusion Detection System for Wireless Sensor Networks.
В наличии
Местонахождение: Алматы | Состояние экземпляра: новый |
Бумажная
версия
версия
Автор: Swati Patel
ISBN: 9786202530521
Год издания: 2020
Формат книги: 60×90/16 (145×215 мм)
Количество страниц: 108
Издательство: LAP LAMBERT Academic Publishing
Цена: 32173 тг
Положить в корзину
Позиции в рубрикаторе
Отрасли знаний:Код товара: 571872
Способы доставки в город Алматы * комплектация (срок до отгрузки) не более 2 рабочих дней |
Самовывоз из города Алматы (пункты самовывоза партнёра CDEK) |
Курьерская доставка CDEK из города Москва |
Доставка Почтой России из города Москва |
Аннотация: Security of Wireless sensor network (WSN) becomes a very important issue with the rapid development of WSN that is vulnerable to a wide range of attacks due to deployment in the hostile environment and having limited resources. Intrusion detection system is one of the major and efficient defensive methods against attacks in WSN. A particularly devastating attack is selective reporting, where an intruded node forces to transfer important data inside the network to the other node. The other attacks are also important to detect. These attacks are outsider attack and blackhole attack. Blackhole attack occurs when the receiver waits more than the stipulated time to receive the data from its previous node. Outsider attack occurs when the node from outside the network tries to connect to the network. The project aims to detect these attacks and also prevent its adverse effects on the system.
Ключевые слова: Wireless Sensor Network, Intrusion Detection, internet security, OSPF
Похожие издания
Отрасли экономики: Промышленность в целом Palanichamy Sudha Intrusion Detection in Big Data Environment. PROFICIENT INTRUSION DETECTION SYSTEM USING MAP REDUCE BASED DEEP LEARNING IN BIG DATA ENVIRONMENT. 1905 г., 236 стр., мягкий переплет Nowadays, information system management, large-scale data-clustering and classification have become increasingly important and a challenging area. While several tools and methods have been proposed, few of them are sufficient and efficient enough for real applications due to the rapid growing-in-size and high-dimensional data inputs. Intrusion in... | 51240 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование Amirhossein Abdi Evaluation of Machine Learning Classification Techniques in IDS. An exhaustive survey on the performance of the top four machine learning classifiers in the intrusion detection system. 1905 г., 100 стр., мягкий переплет With the rapid development of information technology, computer networks are exposed to a wide variety of vulnerabilities and an increasing number of security threats. Intrusive traffics affects the normal functionality of the network’s operation. Thus, a need for more intelligent and sophisticated security controls such as intrusion detection... | 34793 тг | |
Отрасли знаний: Общественные науки -> Экономика Chibuzor John Ugochukwu An intrusion detection system using machine learning algorithm. . 2019 г., 76 стр., мягкий переплет Security of data in a network-based computer system has become a major challenge in the world today. With the high increase of network traffic, hackers and malicious users are devising new ways of breaking into computer networks. In other to tackle this problem, an intrusion detection system (IDS) is developed to control access and detect attacks... | 23777 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Avinab Marahatta Enhanced Intrusion Detection System for MANETs. . 2019 г., 96 стр., мягкий переплет The migration to the wireless network from the wired network has been a global trend in the past few years. The scalability and mobility brought by wireless network made it possible in many applications. Among all the up to date wireless networks, Mobile circumstantial Network (MANET) is one amongst the foremost necessary and distinctive... | 31747 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование Amudha Palaniswamy Data Mining Approach for Intrusion Detection System. . 2018 г., 88 стр., мягкий переплет There is a tremendous growth in the field of information technology due to which, network security is also facing significant challenge.The traditional Intrusion Detection System (IDS) is unable to handle the recent attacks and malware's. Hence, IDS which is an indispensable component of the network needs to be protected. Data mining based network... | 24203 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование Phiza Ambreen Khan and Imran Khan Watchdog based Intrusion detection system in WSN. Watchdog based False Misbehavior Removal Approach in WSN. 2018 г., 80 стр., мягкий переплет In today's era security is one of the main concerns in every field particularly in wireless sensor networks. Resource limitation is a main concern of sensor nodes in wireless sensor networks. There are many security threats which are affecting the functionality, security and network life time of wireless sensor networks. Our goal is to create an... | 23919 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование Pradeep Laxkar and Prasun Chakrabarti Intrusion Detection System Using SPARK'S Machine Learning Library. Secure your network. 2018 г., 92 стр., мягкий переплет Now a day’s computer network security problems play a pivotal role. The network is vulnerable towards attacks like DOS, U2R, R2L etc. These attacks take advantage of a network vulnerability to gain illegal access to important information or sometimes create a flood to prevent genuine users from accessing it. Network attackers use massive volume... | 31605 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование Wathiq Laftah Al-Yaseen Multiagent System for an Adaptive Real Time Intrusion Detection System. . 2018 г., 272 стр., мягкий переплет The increased speed of network data traffic and growing number of attacks on computer networks have become challenges for an intrusion detection system’s (IDS) such as long processing time, low detection rates and adaptively on new attacks. Most researches attempted to overcome the obstacles by improving the algorithm or improving the IDS’s... | 51551 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование Deepika Agrawal and Punit Gupta Multilayer Intrusion Detection System for Infrastructure-as-a-Service. . 2018 г., 88 стр., мягкий переплет Cloud Computing provides many types of services mainly SaaS, PaaS, IaaS. Each of them has its own security challenges, but IaaS undertakes all types of challenges viz., network attack and request based attacks ie handling the requests from untrusted users, XSS (cross-site scripting attack), DDOS and many more. These attacks are independent of each... | 22267 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Akbar Shaik Enhanced Intrusion Detection System Using Machine Learning Techniques. . 2017 г., 164 стр., мягкий переплет This book provides a machine learning technique was proposed to identify the network attacks. IDS is an important technology that monitors the network traffic and identifies the network intrusions. The primary objective of this rule based intrusion detection system detects the errors with high detection rate and low false alarm rate. This book... | 39002 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Vishal Badgujar and Sudhir Dhage Intrusion Detection System in Wireless Sensor Network. Comparison of Different IDS Schemes. 2017 г., 64 стр., мягкий переплет A Wireless Network consist of Wireless Sensor Network and wireless Ad-hoc Network, WSN composed of hundreds or even thousands of small cheap sensor nodes which communicate with one another wirelessly. In Wireless Ad-hoc Network mobile nodes moving arbitrary in the places that have no network infrastructure, hence they are easily vulnerable to... | 21414 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Imdadul Karim and Quoc-Tuan Vien Snort-based Intrusion Detection System for Practical Computer Networks. Implementation and Comparative Study. 2017 г., 132 стр., мягкий переплет A significant amount of research has been done to evaluate the performance of Network Intrusion Detection System (NIDS). Most of the works were performed in a moderate traffic condition. It is not worth enough to analyse the NIDS performance based on non-realistic traffic flow and under limited conditions. In this project, authors introduce some... | 33510 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Diyar Salah Fadhil and Samir Al-Khayatt Automatic Intrusion Prevention Technique to Improve Network Security. Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Firewall to secure the network. 2016 г., 76 стр., мягкий переплет Some of the important tools are considered against attacks from hacker’s such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Firewall to secure the network. Ironically, more adverse effects on the network have brought by these malicious attacks than before. At present, Both IDS and IPS do not support information... | 21841 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Sandip Sonawane Automatically Tuning Intrusion Detection System (ATIDS). . 2016 г., 80 стр., мягкий переплет Automatically Tuning Intrusion Detection System (ATIDS) makes tuning automatically. The key idea is to use the binary SLIPPER as a basic module, which is a rule learner based on confidence-rated boosting. This system is evaluated using the NSL KDD intrusion detection dataset. An experimental result shows the SCIDS system with SLIPPER algorithm... | 26823 тг | |
Сферы деятельности: Предпринимательская деятельность -> Менеджмент Sandip Sonawane Self Configuring Intrusion Detection System (SCIDS). . 2016 г., 80 стр., мягкий переплет With the rapid expansion of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to identify malicious use is through monitoring unusual user activity. To identify these malicious activities various data-mining and machine learning techniques have been deployed for intrusion... | 21983 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование Fadwa Awn Performance Study of Intrusion Detection Systems. . 2016 г., 108 стр., мягкий переплет Information security becomes a major issue in the recent decade due to wide spread of the network and Internet that consider as insecure transmission media, from this point of view security participants focus their effort to provide best method implementing information security, one of these methods is Intrusion Detection System (IDS). IDS is a... | 32173 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Abdullah Mohamed and Dia Ali Network Intrusion Detection System Based on Embedded System. Off-line and On-line NIDS Based on Embedded System: Design and Implementation. 2016 г., 104 стр., мягкий переплет This research is a new attempt in the NIDS designing methods. Off-line NIDS is designed and then developed to an on-line NIDS. The required tools and sub-systems for developing the off-line to on-line NIDS are built: Tapping system, Real-time Operation System (RTOS) and the Packet Feature Extractor (PFE). The attempt succeeded and gave a good... | 32031 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование Bibi Masoomeh Aslahi Shahri Intrusion Detection System Using Hybrid Gsa-kmeans. . 2014 г., 128 стр., мягкий переплет Security is an important aspect in our daily life. Intrusion Detection Systems (IDS) are developed to be the defense against security threats. Current signature based IDS like firewalls and antiviruses, which rely on labeled training data, generally cannot detect novel attacks. The purpose of this study is to improve the performance of IDS in... | 36272 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Аппаратное обеспечение Govind Sreekar Shenoy Architecture Support for Intrusion Detection systems. Hardware and Software techniques to improve the performance and area efficiency of an IDS. 2014 г., 160 стр., мягкий переплет System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates by inspecting packets flowing in the network for malicious content. To do so, an IDS like Snort[49] compares bytes in a packet... | 32569 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Heba Fathy Eid Computational Intelligence in Network Intrusion Detection System. . 2014 г., 164 стр., мягкий переплет This book objectives is to outline the idea of network intruder discovery in Intrusion detection system (IDS). It presents a solution to the problem challenges of data dimension and detection of network intrusions. The solution described in book can be summarized into two direction:(1) Proposing four hybrid anomaly Network intrusion detection... | 46262 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Nasim Beigi-Mohammadi Smart Meter Networks: Intrusion Detection System by Design. . 2014 г., 136 стр., мягкий переплет Smart grid is expected to improve the efficiency, reliability and economics of current energy systems. Using two-way flow of energy and information, smart grid builds an automated, highly distributed energy delivery network. In this book, the requirements for intrusion detection systems in smart grid, neighborhood area network (NAN) in particular,... | 36556 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Yogesh Kumar,Krishan Kumar and Gulshan Kumar Feature Selection For Intrusion Detection Systems. Using data mining techniques. 2014 г., 100 стр., мягкий переплет Network security is a serious global concern. The increasing prevalence of malware and incidents of attacks hinders the utilization of the Internet to its greatest benefit and incur significant economic losses. The traditional approaches in securing systems against threats are designing mechanisms that create a protective shield, almost always... | 31889 тг | |
Отрасли знаний: Точные науки -> Информатика и программирование -> Интернет и локальные сети Siva S. Sivatha Sindhu,S. Geetha and S. Selvakumar Network Intrusion Detection System using Machine Learning Techniques. A Quick Reference. 2013 г., 80 стр., мягкий переплет This book presents the need for intrusion detection system as it has become an essential concern with the growing use of internet and increased network attacks such as virus, Trojan horse, worms and creative hackers. In addition, the basic details about the historic origin of IDS, the types of IDS, their deployment schemes and general architecture... | 23919 тг |