The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most of the existing intrusion detection system security visualization in which alarms are statistically analyzed and their quantity and distribution are usually represented using 2D/3D charts, some studies have shown that intrusion detection scene visualization is perhaps more effective. The contributions of this paper mainly focus on one aspect, we present a realtime intrusion detection security...
This paper proposed a new anomaly detection algorithm that can update normal profile of system usage pattern dynamically. The feature used to model systempsilas usage pattern was program behavior. When system usage pattern changed, new program behaviors will be inserted into old profiles by density-based incremental clustering. Compared to traditional re-clustering updating, it is much more efficiently...
With the increasing network security accidents, intrusion detection systems (IDS) have been an indispensable part of information system. As a popular light network intrusion detection system, Snort has been a focus in research field. In this paper, dynamic adjustment algorithm is applied to the improvement of rule matching based on the analysis of original mechanism of Snort. Additionally, further...
Intrusion detection systems (IDS) are fundamentally passive and fail-open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intrusion prevention system (IPS) is deployed in-line with its capability to provide real-time and active defense. It makes attempts to stop attacks. This paper presents the design and implementation of LDLB: a light intrusion...
Since the first denial of service (DoS) attack appears, DoS attacks cause significant financial damage every year. The majority researchers focus on detection and respond mechanism of DoS, whereas limited progress has been made in the details of DoS attacks. In this paper, we introduce custom audit scripting language (CASL) applied to write simulation program for DoS attacks. Then we take a deep research...
Data collection mechanism is a crucial factor of the performance of intrusion detection system (IDS). Stratified random sampling technique of statistics is introduced to the procedure of data collection of IDS, and a new data collection model and its implementation for IDS are provided in this paper. The issue of sample size allocation in strata is discussed, and formulas used to calculate the sample...
As a very important component of secure operating system, auditing subsystem has been playing a key role in monitoring the system, insuring proper implementing of security policy, and building intrusion detection systems. The original Linux audit mechanism based on applications has inherent flaws, and should be improved. This paper presents the design and implementation of a secure auditing system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.