Welcome![Sign In][Sign Up]
Location:
Search - ids

Search list

[OtherPrinciplesofInformationSystemsSecurity

Description: 应用的角度介绍计算机信息系统安全原理,并将有关内容按照如下体系梳理:第1篇攻防技术:内容包括恶意程序、网络攻击(黑客)、隔离技术(防火墙、物理隔离和电磁防护)、安全监控(IDS、网络诱骗和审计)、紧急响应和取证;第2篇安全信任体系:内容包括加密与信息隐藏、认证、安全协议;第3篇安全体系结构和评估标准。 -Perspective on the application of computer information system security principles, and the contents sorted according to the following system: the first an offensive and defensive techniques: including malicious programs, network attacks (hackers), isolation technology (firewalls, physical isolation and electromagnetic protection), security monitoring (IDS, network trap and audit), emergency response and forensics No. 2 security trust system: the content includes encryption and information hiding, authentication, security protocols the first three security architecture and evaluation criteria.
Platform: | Size: 1846272 | Author: 莫莉 | Hits:

[AI-NN-PRResearch_on_Network_intrusion_detection_based_on_d

Description: 本文提出一种基于数据挖掘的入侵检测模型,其主要思想是利用数据挖掘的方法,从经预处理的包含网络连接信息的 审计数据中提取能够区分正常和入侵的规则,并用来检测入侵行为。对Apriori 算法中求频繁集时扫描数据库I/O 负载惊人 的问题提出了一种改进办法。为验证该算法的可行性,文章最后实现了该入侵检测模型的知识库中正常连接规则的挖掘。实 验表明该模型能提取特征生成新规则,并证明了方法的可行性和有效性。-In this paper an intrusion detection system based on data mining is proposed, and its main idea is to apply data mining methods to learn rules that can capture normal and intrusion activities from pre- processed audit data that contain network connection information. Put forward a method to improve the Apriori algorithm, whose I/O is quite surprising when scanning the database. To improve the method is feasible the normal rules in the knowledge database in IDS are mined. And the experiment indicates that the model can produce new rules, which approve the validity and the feasibility of the IDS.
Platform: | Size: 207872 | Author: youby | Hits:

[Internet-Network87361022perfect-IDS

Description: 入侵检测系统源码,你可放假诶哦很够过后阿黑哥合格偶igh-the nature thing for system,you can do it by visual C++,or something you like, but you mast change some of it ,ef fefe fa eff ef
Platform: | Size: 160768 | Author: csq | Hits:

[Otherids

Description: 不确定聚类算法及其在入侵检测系统中应用及其概况。-Uncertain clustering algorithm and its application in intrusion detection system
Platform: | Size: 244736 | Author: 杨萌 | Hits:

[Special Effectshongwaituxiang

Description: 为了在抑制噪声时尽可能保留图像边缘信息,提出一种自适应各向异性高斯滤波器设计方法. 该方法由独立 强度传播(IDS)模型决定滤波器的长轴尺度,由像素的邻域平滑度决定长短轴的比例,然后根据该处的灰度梯度方 向自适应决定各向异性滤波器的长轴方向. 仿真实验表明,提出的自适应各向异性滤波器具有很强的噪声抑制和 边缘保持能力. -In order to suppress noise, as far as possible to keep the image edge information, an adaptive anisotropic Gaussian filter design methods. The method by the independent strength spread (IDS) model determines the long axis of the filter scale, the pixel neighborhood smoothness determine the ratio of minor axis, and then there' s gray gradient direction of adaptive decision the long axis of anisotropic filter. Simulation results show that the proposed adaptive anisotropic filter has a strong noise suppression and preserve edges.
Platform: | Size: 207872 | Author: wangcong | Hits:

[Windows DevelopAttacksClassificationinAdaptivIntrusion

Description: Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious network-based or host-based attacks by using traditional statistical methods to new data mining approaches in last decades. However, today s commercially available intrusion detection systems are signature-based that are not capable of detecting unknown attacks. In this paper, we present a new learning algorithm for anomaly based network intrusion detection system using decision tree algorithm that distinguishes attacks from normal behaviors and identifies different types of intrusions. Experimental results on the KDD99 benchmark network intrusion detection dataset demonstrate that the proposed learning algorithm achieved 98 detection rate (DR) in comparison with other existing methods.-Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious network-based or host-based attacks by using traditional statistical methods to new data mining approaches in last decades. However, today s commercially available intrusion detection systems are signature-based that are not capable of detecting unknown attacks. In this paper, we present a new learning algorithm for anomaly based network intrusion detection system using decision tree algorithm that distinguishes attacks from normal behaviors and identifies different types of intrusions. Experimental results on the KDD99 benchmark network intrusion detection dataset demonstrate that the proposed learning algorithm achieved 98 detection rate (DR) in comparison with other existing methods.
Platform: | Size: 312320 | Author: keerthi | Hits:

[JSP/Javaworkbench

Description: 这个代码还可以主要使用JAVA编译环境写的。请大家看看,不足之处请体谅-this ids very good dgdfgsd gdgd fdgdggfdg dfgdfgdfsgsdgdfg
Platform: | Size: 2817024 | Author: 松小子 | Hits:

[Industry researchids

Description: For anomaly detection
Platform: | Size: 105472 | Author: needs | Hits:

[Internet-Networkids(src)

Description: 网络入侵检测系统的源代码。入侵检测系统具有实时检测,报警和动态响应等功能.是否能够很好地帮助网络管理员 完成对网络状态的把握和安全的评价是入侵检测系统的基本标准。-Network intrusion detection system source code. Intrusion detection system with real-time detection, alert and dynamic response functions. It can well help network administrators complete grasp of network status and security intrusion detection system evaluation is the basic standard.
Platform: | Size: 2161664 | Author: WANGYING | Hits:

[Windows Developids_new

Description: 一个ids(入侵检测系统)的源码,用于二次开发使用。-A ids (intrusion detection system) source code, used for secondary development.
Platform: | Size: 1786880 | Author: WANGYING | Hits:

[Windows Developadodb511

Description: IDS入侵检测系统的安装和部署,一款用于Windows平台下的软件。-Snort® is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire.
Platform: | Size: 693248 | Author: gram | Hits:

[Internet-NetworkMausezahn-0.40

Description: Mausezahn 是一个采用C开发的快速的网络包生成工具。让您发送几乎一切可能的和不可能的数据包。它主要用于测试VoIP或组播的网络,但也为安全审计,以检查是否你的系统是强化具体的攻击不够。-Mausezahn is a free fast traffic generator written in C which allows you to send nearly every possible and impossible packet. It is mainly used to test VoIP or multicast networks but also for security audits to check whether your systems are hardened enough for specific attacks. Mausezahn can be used for example: As traffic generator (e. g. to stress multicast networks) To precisely measure jitter (delay variations) between two hosts (e. g. for VoIP-SLA verification) As didactical tool during a datacom lecture or for lab exercises For penetration testing of firewalls and IDS For DoS attacks on networks (for audit purposes of course) To find bugs in network software or appliances For reconnaissance attacks using ping sweeps and port scans To test network behaviour under strange circumstances (stress test, malformed packets, ...)
Platform: | Size: 913408 | Author: susu | Hits:

[Internet-Networkids

Description: 入侵检测系统是通过诸如,数据审计,网络报文分析等手段,检测各种入侵行为,保证网络安全。英文是intrusion detection system (IDS)。 -Intrusion detection system is through such, data auditing, network packet analysis tools, all kinds of intrusion detection to ensure network security. English is the intrusion detection system (IDS).
Platform: | Size: 45056 | Author: dcs | Hits:

[matlabIDS

Description: 一本关于入侵检测的书,内容具体,系统全面。-A book on intrusion detection, content specific, systematic and comprehensive.
Platform: | Size: 267264 | Author: cookie | Hits:

[OtherPPT

Description: IDS Intrusion Detection System
Platform: | Size: 1856512 | Author: svelu | Hits:

[matlabIDS-method

Description: this a very good matlab implementation of IDS fuzzy modelling technique. it is very simple and has very good computational complexity.-this is a very good matlab implementation of IDS fuzzy modelling technique. it is very simple and has very good computational complexity.
Platform: | Size: 8192 | Author: sma | Hits:

[Internet-Networkids

Description: 入侵检测试验的一部分 嗅探器代码 可运行 经过编译-ids system
Platform: | Size: 1532928 | Author: 崔帆 | Hits:

[Software Engineeringlinux-IDS

Description: how to install configure ids in linux, a simple guide
Platform: | Size: 155648 | Author: abdelbacet | Hits:

[OtherIDS-to-SDD-Transition-Guide-v2.5

Description: This document provides supplemental information about the SDD diagnostic environment launched on IDS DVD119, and is highly recommended to be read by all JLR Service Technicians before using SDD.
Platform: | Size: 462848 | Author: eizo | Hits:

[OtherIDS-Maintenance-a-Troubleshooting-Guide_v2.2

Description: The Legacy T4 Cables that come with the IDS kit supplied by SPX have been assigned new part numbers for identification purposes in the event a warranty replacement is required. Please note the RDS software and cable guide refer to the cables using the original part number & description no other differences other than the part number exists. All cables have both part number identifiers on them for cross reference purposes. Refer to the cross reference matrix in identifying the cables by part number and function.-The Legacy T4 Cables that come with the IDS kit supplied by SPX have been assigned new part numbers for identification purposes in the event a warranty replacement is required. Please note the RDS software and cable guide refer to the cables using the original part number & description no other differences other than the part number exists. All cables have both part number identifiers on them for cross reference purposes. Refer to the cross reference matrix in identifying the cables by part number and function.
Platform: | Size: 2229248 | Author: eizo | Hits:
« 1 2 34 5 6 7 8 9 10 ... 20 »

CodeBus www.codebus.net