The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, an intrusion detection model is proposed based on multilayer perceptrons neural network . In this model, HISTORY is used to collect data. Then, the data stream is converted its' data structure for preprocessing. We use pattern matching module to filter out some of the known intrusions, in oder to reduce the load of the next step on intrusion detection, and the efficiency and accuracy...
Pattern matching method has been used in this paper, and intrusion detection method based on protocol acknowledgement is proposed. We analyze how to determine the time interval value of ΔT and the threshold value of N, and the existence of direct proportion relationship between ΔT and N is proved. The protocol acknowledgement module includes packet filtering and state protocol analysis techniques...
A new network-worm-control technology is proposed after having fully analyzed the differences between worm and normal connection requests. Considering the worm characteristic of attacking unique port and dispersing IP addresses, the method uses multiple data sets according to the different ports to avoid the influence among the ports. Aiming at the normal connection characteristic of ephemeral bursting...
Based on the Probabilistic Packet Marking Scheme, a new Authenticated Packet Marking Scheme for IP trace-back is proposed. The novel scheme adopts a new dynamic probability value sequence to mark packets. Compared with PPM Scheme, the new scheme doesn't need the topology of network and it improves a lot on false positive, computational complexity and astringency. Meanwhile, propose one kind of DDoS...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.