The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Our network infrastructure is exposed to persistent threats of DDoS and many unknown attacks. These threats threaten the availability of ISP's network and services. This paper proposes network-based anomalous traffic detection method and presents an anomalous traffic detection system, its architecture and main function blocks. Every five minutes, traffic information and security events are gathered...
At present, the focus of network security research mainly centers on the increase of detection ability of a single detection tool. For example, improve the accuracy and detection efficiency of firewall and intrusion detection system but despise the defense ability of the whole network system. This paper puts forward the concept of network active defense system and emphatically analyzes its architecture,...
The underpinning of situational awareness in computer networks is to identify adversaries, estimate impact of attacks, evaluate risks, understand situations and make sound decisions on how to protect valued assets swiftly and accurately. SA also underscores situation assessment in order to make accurate forecast in dynamic and complex environments. In this paper, situational awareness in computer...
This paper studies a stochastic game theoretic approach to security and intrusion detection in communication and computer networks. Specifically, an Attacker and a Defender take part in a two-player game over a network of nodes whose security assets and vulnerabilities are correlated. Such a network can be modeled using weighted directed graphs with the edges representing the influence among the nodes...
Computer networks are one of those unique gifts of modern science which enriched human life with the blessing of global connectivity. But as the network advanced, intrusions and misuses followed. Consequently, network security has come into issue. Now-a-days intrusion detection systems have become a standard component in security infrastructures. Intrusions typically start with intruders infiltrating...
With the multiplication of attacks on computer networks, system administrators need to monitor carefully the networks. But all the techniques or tools that they use still heavily rely on human detection. In this paper a visual interactive network connection system called NetViewer is designed in 3D view for representing traffic activities that reside in network flows and their patterns. The experiments...
Recent years have seen a growing interest in computational methods based upon natural phenomena with biologically inspired techniques. The use of immune mechanisms in intrusion detection is an appealing concept. This paper reviews and assesses the analogy between the human immune system and intrusion detection systems. We show how immune metaphors can be used efficiently to build intrusion detection...
Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are now considered a mainstream security technology. IDS and IPS are designed to identify security breaches. However, one of the most important problems with current IDS and IPS is the lack of the ldquoenvironmental awarenessrdquo (i.e. security policy, network topology and software). This ignorance triggers many false positives...
With the progression of time, we have been blessed with the gifts of science. Computer networks are one of those gifts. But as the network proceeded, intrusions and misuses followed. Consequently, network security has come to the fore front and has become one of the most important issues. Now-a-days intrusion detection systems have become a standard component in security infrastructures. Intrusions...
An artificial immune system (ARTIS) enlightened by the biological immune system is emerging as a new field of computation intelligence research. At present, it showed us many properties after the research to the immune system, including distributed computation, self-organization and lightweight, which were discovered to meet the requests of ARTIS. So the Immunology applied to the intrusion detection...
In order to monitor network transmission effectively and safely and detect suspicious behavior in the network, the intrusion detection software was solidified in embedded hardware development board based on the SBC84620. The system adopted real-time Linux operating system used in the field of industrial widely, achieved real-time detection and prevention to hacking attack including port scans, buffer...
Network security is a critical component for any sized organization. While static defence technologies such as firewalls and anti-virus provide basic protection for computer networks, an intrusion detection system (IDS) can improve overall security by identifying and responding to novel malicious activities. The current existing IDS methods suffer from low accuracy and system robustness. To overcome...
Covert channels exist in most communications systems and allow individuals to communicate truly undetectable and exchange hidden information. That's why their detection seems to be a big deal for security systems. However, till now, security systems do not include dedicated processes for covert channel detection. In this paper, we first propose mechanisms to detect common covert channels. Then, within...
Availability is one of the main characteristics of Internet security and hence attacks against networks increase trying to stop services on servers. Distributed denial of service attacks are very dangerous for computer networks and services availability. Various defense systems were proposed. Unfortunately, until now, there is no efficient solution. This paper presents a decentralized architecture...
The aim of the contribution is to present an attempt to utilize some data about network topology and performance to increase capabilities of intrusion detection system. Some simple example presents an approach to design topology (location and the needed number of intrusion detection devices) which allows efficiently detecting intrusions and limiting the overall overhead caused by intrusion detection...
The rapid proliferation of computer networks has changed the prospect of network security. An easy accessibility condition cause computer networkpsilas vulnerable against several threats from hackers. Threats to networks are numerous and potentially devastating. Up to the moment, researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several available environments...
In recent years, the network attack become more and more widespread and difficult in against. The traditional technique, such as Firewall is good, but when malicious traffic originates from inside network or enters through a hole in the firewall you may need another line of defense to protect you. This is a article introducing the concepts of IDS, what they do, the functions they serve, the classification...
Recently network intrusion detection is one of the hottest research topics. Existing network-based Intrusion Detection System (IDS) has drawbacks in many aspects, among of which the two outstanding problems are the high ratio of false alarms and the lack of self-adaptation. The powerful information processing capabilities of the biological immune system, such as feature extraction, pattern recognition,...
Recent security incidents and analysis have demonstrated that current intrusion detection systems (1DS) to some attacks are no longer feasible. Implementing an effective intrusion detection capability is an elusive goal, not solved easily or with a single mechanism. However, we argue that "SoftMan" (SM) technology goes a long way toward realizing the ideal behavior desired in an intrusion...
Intrusion detection system will produce large numbers of alerts, most of which are fasle positives. This paper wants to associate multiple intrusion detection systems in large-scale network to reduce overwhelming false alerts and discover real security events in real time. For processing these alerts, two algrithms named reduce and cluster will be developed in this paper, which can remove false alerts...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.