Welcome![Sign In][Sign Up]
Location:
Search - ids

Search list

[OS programreducingdemension

Description: 网络入侵检测降维算法。它的作用是把捕获的数据进行分析,输出有用的信息。-the algorithm about reducing demension in analysing the data for ids.
Platform: | Size: 105472 | Author: marty | Hits:

[Other28153903

Description: 来源:http://cctf.shmoo.com/data/cctf-defcon8/(可以自己下载更多数据) 真实的网络数据,可以用来评测IDS性能。-Source: http://cctf.shmoo.com/data/cctf-defcon8/ (you can download more data on their own) the real network data can be used to evaluation performance of IDS.
Platform: | Size: 38021120 | Author: 齐慧玲 | Hits:

[OtherTriangle

Description: Ask the user for two filenames. The first filename specifies the input file and the second filename specifies the output file. You can assume the filenames do not contain any whitespace characters. Your objective is to sort all the triangles represented in the input file in ascending order based on their area sizes and output the sorted list of triangles to the output file following the same file format. Among all the triangles with the same area size, sort them in ascending order according to their IDs. You must use Triangle objects in your program to represent the triangles you read from the file. If your program fails to open a file, it should display an error message and terminate immediately. -Ask the user for two filenames. The first filename specifies the input file and the second filename specifies the output file. You can assume the filenames do not contain any whitespace characters. Your objective is to sort all the triangles represented in the input file in ascending order based on their area sizes and output the sorted list of triangles to the output file following the same file format. Among all the triangles with the same area size, sort them in ascending order according to their IDs. You must use Triangle objects in your program to represent the triangles you read from the file. If your program fails to open a file, it should display an error message and terminate immediately.
Platform: | Size: 1024 | Author: alan | Hits:

[BooksMiscellaneousTopics

Description: 对于非常大的数据库(VLDB使用大文件表空间) 描述了大文件表行标识 使用临时表空间组(TTG)上的VLDB-Use bigfile tablespaces for very large databases (VLDB) Describe the row IDs for bigfile tablespaces Use temporary tablespace groups (TTG) for VLDB
Platform: | Size: 96256 | Author: 李月怡 | Hits:

[OS programbase-1.4.5.tar

Description: Basic Analysis and Security Engine (BASE): BASE是一个用来查看Snort IDS告警的Web应用程序。-Basic Analysis and Security Engine (BASE): BASE is a Snort IDS is used to view the alarms of the Web application.
Platform: | Size: 958464 | Author: 李海伟 | Hits:

[Internet-Networksnort-2.8.5.3.tar

Description: snort轻量级网路入侵检测系统的源代码,是一款非常强大的NIDS工具。-lightweight network intrusion detection system snort source code, is a very powerful tool for NIDS.
Platform: | Size: 4730880 | Author: 龚小红 | Hits:

[ActiveX/DCOM/ATLActiveX

Description: Embedding ActiveX controls by their IDs.
Platform: | Size: 12288 | Author: Rohan | Hits:

[Internet-NetworkSnortIDS

Description: 基于snort网络入侵检测系统IDS基于Linux网络入侵检测系统-snort
Platform: | Size: 5355520 | Author: jimingxing | Hits:

[Scannersnort-sort

Description: 入侵检测(Intrusion Detection),它通过对计算机网络或计算机系统中得若干关键点收集信息并对其进行分析,从中发现网络或系统中是否有违反安全策略的行为和被攻击的迹象-IDS (Intrusion Detection), it is through the computer network or computer systems have a number of key in the information collected at and analyze, discover whether the network or system in violation of security policy behavior and indications of attack
Platform: | Size: 2048 | Author: liyabin | Hits:

[Linux-Unixanids

Description: linux下的IDS源码,编辑比较自由,可以根据自己的需要增加规则-IDS under linux source code, edit more freely, according to their need for additional rules
Platform: | Size: 30720 | Author: zhou | Hits:

[Linux-Unixlidstools-2.2.7.2.tar

Description: Linux下的Ids系统 功能比较简单 适合初学者-Ids system functions under Linux is simple for beginners
Platform: | Size: 308224 | Author: 王小二 | Hits:

[Windows DevelopFuzzyIntrusionDetectionSystemviaDataMining

Description: There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is built as a hardware product with its own hardware platform (IDS appliance). In this paper, a host based intrusion detection system, that uses the idea of tracing system calls, is introduced. As a program runs, it uses the services of the underlying operating system to do some system calls. This system does not exactly need to know the program codes of each process. Normal and intrusive behaviors are collected with gathering the sequences of system calls for each process. Analysis of data is done via data mining and fuzzy techniques. Data mining is used to extract normal behaviors (normal unique rules) and Fuzzy to enhance intelligence of the System. The proposed system is shown to improve the performance, and decrease size of database, time complexity, and rate of false alarms.-There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is built as a hardware product with its own hardware platform (IDS appliance). In this paper, a host based intrusion detection system, that uses the idea of tracing system calls, is introduced. As a program runs, it uses the services of the underlying operating system to do some system calls. This system does not exactly need to know the program codes of each process. Normal and intrusive behaviors are collected with gathering the sequences of system calls for each process. Analysis of data is done via data mining and fuzzy techniques. Data mining is used to extract normal behaviors (normal unique rules) and Fuzzy to enhance intelligence of the System. The proposed system is shown to improve the performance, and decrease size of database, time complexity, and rate of false alarms.
Platform: | Size: 710656 | Author: keerthi | Hits:

[Anti-virusids

Description: intrusion detection pdf file
Platform: | Size: 539648 | Author: desuky | Hits:

[JSP/JavaMain11

Description: 孤立点挖掘算法,入侵检测中使用到的孤立点算法的java代码实现-outlier_miner in IDS
Platform: | Size: 1024 | Author: 李敬 | Hits:

[JSP/JavaRecognition_of_hackers

Description: The project titled Recognition of Hacker in Networks Using Genetic Algorithm (IDS) is to identify the intruder and block the data from the intruder to avoid the system attack by the virus. This new system is a replacement of the existing system. In existing system, at run time it will not create a set of rules. The major components of the system are creating new set of rules during run time.- The project titled Recognition of Hacker in Networks Using Genetic Algorithm (IDS) is to identify the intruder and block the data from the intruder to avoid the system attack by the virus. This new system is a replacement of the existing system. In existing system, at run time it will not create a set of rules. The major components of the system are creating new set of rules during run time.
Platform: | Size: 9216 | Author: sumit | Hits:

[Othernessussnort.pdf.tar

Description: Snort是一个轻量级的网络入侵检测系统(NIDS),采用Misused 模式进行检测。在1.7里,新增加的Spade插件使得Snort支持Anormal模式检测。Snort的检测规则是二维的,即包含规则头和规则选项两部分,这比较其他IDS定义的规则来说简单的多。Snort新的插件reference可以将确定的攻击行为同Bugtraq, CVE , arachNIDS, McAfee virus这些标准的攻击标识库结合,给出在线的有关此攻击的URL参考资料。snort的探测规则库也是时时更新反映上面这些库的变化,用户可以到www.snort.org上下载新的规则库文件。-Snort is a lightweight network intrusion detection system (NIDS), were detected by Misused mode. In 1.7, the newly added Spade plug-in allows Snort to support Anormal mode detection. Snort detection rules is two-dimensional, which includes the rules and the rules the first two options, which compared with other IDS rules defined for simple and more. Snort plug-reference the new attack can be identified with the Bugtraq, CVE, arachNIDS, McAfee virus attacks these standards identify libraries combined, give an online reference URL for this attack. snort detection rules database is constantly updated to reflect the above changes in these libraries, the user can go to download the new rules www.snort.org library.
Platform: | Size: 4668416 | Author: zhangruixue | Hits:

[Linux-UnixStMichael_LKM-0.13-k2.6.tar

Description: The Saint Jude Project is a Project to develop Kernel-Level IDS mechinisms to protect the integrity of host systems. A crucial part of Saint Jude is Saint Michael, responsible for protecting the kernel itself from attacks.
Platform: | Size: 198656 | Author: BSDaemon | Hits:

[Linux-UnixStMichael_LKM-0.13.tar

Description: The Saint Jude Project is a Project to develop Kernel-Level IDS mechinisms to protect the integrity of host systems. This is Saint Michael for 2.4 kernels.
Platform: | Size: 40960 | Author: BSDaemon | Hits:

[Linux-UnixStJude_SKM-0.10.tar

Description: The Saint Jude Project is a Project to develop Kernel-Level IDS mechinisms to protect the integrity of host systems. This is the Saint Jude for Solaris
Platform: | Size: 30720 | Author: BSDaemon | Hits:

[Linux-UnixStJude_LKM-0.23.tar

Description: The Saint Jude Project is a Project to develop Kernel-Level IDS mechinisms to protect the integrity of host systems. This is Saint Jude for 2.4 kernels
Platform: | Size: 69632 | Author: BSDaemon | Hits:
« 1 2 ... 4 5 6 7 8 910 11 12 13 14 ... 20 »

CodeBus www.codebus.net