Welcome![Sign In][Sign Up]
Location:
Search - network ids

Search list

[WinSock-NDISIDS

Description: 网络入侵检测系统,属于本人毕业设计的一部分,希望大家指正-network intrusion detection system, belonging to my graduation part of the design, we hope that the correction
Platform: | Size: 11887 | Author: 心灯 | Hits:

[Sniffer Package capturesnort-1.6.0.tar

Description: 入侵检测系统,Snort这个众所周知的网络入侵检测工具,轻型的IDS工具,拥有高效率和良好的可扩展性-Intrusion Detection System, the well-known Snort network intrusion detection tool, lightweight IDS tools, with high efficiency and good scalability
Platform: | Size: 215040 | Author: 董虎 | Hits:

[Internet-NetworkIDS

Description: 网络入侵检测系统,属于本人毕业设计的一部分,希望大家指正-network intrusion detection system, belonging to my graduation part of the design, we hope that the correction
Platform: | Size: 11264 | Author: | Hits:

[source in ebooknids

Description: 该源码是用C语言编写的,实现网络入侵检测系统的功能-source is the C language, network Intrusion Detection System function
Platform: | Size: 2264064 | Author: liuliang | Hits:

[Internet-Networklnids

Description: 这是本人毕业设计.关于网络入侵检测系统的,希望大家看看!-This is my graduation design. On the network intrusion detection system, I hope, we see!
Platform: | Size: 8248320 | Author: liuliang | Hits:

[Industry researchIDS111223

Description: 针对DIDS网络提出了一种基于移动代理的入侵监测系统结构-against DIDS network presents a Mobile Agent Based Intrusion Detection System
Platform: | Size: 6144 | Author: joe | Hits:

[Internet-Networkiids

Description: 加入了ac_bm匹配并完成了部分界面,还有部分功能有待实现的网络入侵检测系统-joined the ac_bm match and completed a part of the interface, there are some functions to be achieved Network Intrusion Detection System
Platform: | Size: 930816 | Author: yu | Hits:

[source in ebooknids

Description: 网络入侵检测系统的原代码,是对snort的进一步改进和完善-Network Intrusion Detection System s original code, is a snort of further improvement and refinement
Platform: | Size: 2241536 | Author: laizhengwen | Hits:

[OS program53520982

Description: IDS系统检测代码 基于主机的入侵检测系统源代码-network intrusion detection system
Platform: | Size: 2160640 | Author: 贾尼 | Hits:

[Internet-Networkids

Description: 网络入侵检测系统的源代码 检测网络入侵的存在 数据来源是收集到的dump数据集-Network Intrusion Detection System Network Intrusion Detection of the source code of the existence of the data collected from the dump data sets
Platform: | Size: 13312 | Author: 王佳妮 | Hits:

[Other21840260IDS

Description: 关于入侵检测的简介 介绍了网络入侵检测的应用 主要是免疫选择方面的-Briefing on the IDS introduced the application of network intrusion detection is immune selection of
Platform: | Size: 12288 | Author: 王佳妮 | Hits:

[Software EngineeringA-hybrid-IDS-design

Description: 本文使用麻省理工学院林肯实验室的网络流量数据( IDEVAL )作为检测混合入侵检测系统性能的试验数据。混合入侵检测系统获得的结果和的基于误用检测入侵检测系统相比较表明,混合入侵检测系统是一个更强大的系统-In this paper, Massachusetts Institute of Technology Lincoln Laboratory data of network traffic (IDEVAL) as the detection of hybrid intrusion detection system performance test data. Hybrid Intrusion Detection System to obtain the results and misuse detection-based intrusion detection system compared to show that the hybrid intrusion detection system is a more powerful system
Platform: | Size: 489472 | Author: 杨川 | Hits:

[Internet-NetworkCVE_intrusion

Description: 本文首先系统分析了 snort 规则的组成,详细的介绍了各个部分的含义,这对于开发出新的入侵检测系统,建立自己的攻击规则库有很大的帮助。针对系统所需的适应性和自治性,在详细剖析 snort 规则同时,着重研究基于 CVE 入侵检测系统的规则库的实现,底层嗅探器的实现和嗅探过程等问题。在规则特征选项的模式匹配问题上进行重点说明,给出了一种改进的检测方法,即结合使用协议分析进行模式匹配,从试验数据上大大提高了效率,减少了误报率。同时,本系统所基于的 CVE 知识库,跟踪国际上 CVE 的最新发展动态,制订了国内统一的 CVE 标准,具有极大丰富的知识库,有效的解决了国内漏洞库不统一的问题.-The author also describes the architecture and functions and the design and the implement of the software. Intrusion detection system (IDS) is very important for network security. At present, the author systematically analyzes the composition and semantics of Snort rules, which may be of great help for creating signature database, then the paper studies the flexibility and self-controllability in the CVE-based Intrusion Detection System, emphasizes not only on analysis of the snort rules, but on the realization of intrusion detecting based on CVE rules and the implement of the sniffer. Especially, this paper covers the intrusion signature matching methods, and analyzes the weakness when only uses pattern matching in intrusion analysis and presents an improved approach that combines protocol analysis and pattern matching, to dectect attacks. At the same time it gives an example to show how to use this approach. The experimental results show that the rules surely reduce the rate of misd
Platform: | Size: 478208 | Author: 陈中 | Hits:

[Otherj2178_p3

Description: J2178-3: Class B Data Communications Network messages. Frame IDs for Single-Byte Forms of Headers
Platform: | Size: 742400 | Author: DrugWash | Hits:

[OtherPrinciplesofInformationSystemsSecurity

Description: 应用的角度介绍计算机信息系统安全原理,并将有关内容按照如下体系梳理:第1篇攻防技术:内容包括恶意程序、网络攻击(黑客)、隔离技术(防火墙、物理隔离和电磁防护)、安全监控(IDS、网络诱骗和审计)、紧急响应和取证;第2篇安全信任体系:内容包括加密与信息隐藏、认证、安全协议;第3篇安全体系结构和评估标准。 -Perspective on the application of computer information system security principles, and the contents sorted according to the following system: the first an offensive and defensive techniques: including malicious programs, network attacks (hackers), isolation technology (firewalls, physical isolation and electromagnetic protection), security monitoring (IDS, network trap and audit), emergency response and forensics No. 2 security trust system: the content includes encryption and information hiding, authentication, security protocols the first three security architecture and evaluation criteria.
Platform: | Size: 1846272 | Author: 莫莉 | Hits:

[AI-NN-PRResearch_on_Network_intrusion_detection_based_on_d

Description: 本文提出一种基于数据挖掘的入侵检测模型,其主要思想是利用数据挖掘的方法,从经预处理的包含网络连接信息的 审计数据中提取能够区分正常和入侵的规则,并用来检测入侵行为。对Apriori 算法中求频繁集时扫描数据库I/O 负载惊人 的问题提出了一种改进办法。为验证该算法的可行性,文章最后实现了该入侵检测模型的知识库中正常连接规则的挖掘。实 验表明该模型能提取特征生成新规则,并证明了方法的可行性和有效性。-In this paper an intrusion detection system based on data mining is proposed, and its main idea is to apply data mining methods to learn rules that can capture normal and intrusion activities from pre- processed audit data that contain network connection information. Put forward a method to improve the Apriori algorithm, whose I/O is quite surprising when scanning the database. To improve the method is feasible the normal rules in the knowledge database in IDS are mined. And the experiment indicates that the model can produce new rules, which approve the validity and the feasibility of the IDS.
Platform: | Size: 207872 | Author: youby | Hits:

[Internet-Networksnort-2.8.5.3.tar

Description: snort轻量级网路入侵检测系统的源代码,是一款非常强大的NIDS工具。-lightweight network intrusion detection system snort source code, is a very powerful tool for NIDS.
Platform: | Size: 4730880 | Author: 龚小红 | Hits:

[Windows DevelopAttacksClassificationinAdaptivIntrusion

Description: Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious network-based or host-based attacks by using traditional statistical methods to new data mining approaches in last decades. However, today s commercially available intrusion detection systems are signature-based that are not capable of detecting unknown attacks. In this paper, we present a new learning algorithm for anomaly based network intrusion detection system using decision tree algorithm that distinguishes attacks from normal behaviors and identifies different types of intrusions. Experimental results on the KDD99 benchmark network intrusion detection dataset demonstrate that the proposed learning algorithm achieved 98 detection rate (DR) in comparison with other existing methods.-Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious network-based or host-based attacks by using traditional statistical methods to new data mining approaches in last decades. However, today s commercially available intrusion detection systems are signature-based that are not capable of detecting unknown attacks. In this paper, we present a new learning algorithm for anomaly based network intrusion detection system using decision tree algorithm that distinguishes attacks from normal behaviors and identifies different types of intrusions. Experimental results on the KDD99 benchmark network intrusion detection dataset demonstrate that the proposed learning algorithm achieved 98 detection rate (DR) in comparison with other existing methods.
Platform: | Size: 312320 | Author: keerthi | Hits:

[Software EngineeringIDS

Description: A Java Based Network Intrusion Detection System (IDS)
Platform: | Size: 29696 | Author: idriss | Hits:

[Internet-Networkids(src)

Description: 网络入侵检测系统的源代码。入侵检测系统具有实时检测,报警和动态响应等功能.是否能够很好地帮助网络管理员 完成对网络状态的把握和安全的评价是入侵检测系统的基本标准。-Network intrusion detection system source code. Intrusion detection system with real-time detection, alert and dynamic response functions. It can well help network administrators complete grasp of network status and security intrusion detection system evaluation is the basic standard.
Platform: | Size: 2161664 | Author: WANGYING | Hits:
« 12 3 »

CodeBus www.codebus.net