Welcome![Sign In][Sign Up]
Location:
Search - network Intrusion Detection system

Search list

[Internet-Network网络入侵检测系统(源码)

Description: 网络入侵检测系统-Network Intrusion Detection system
Platform: | Size: 2161664 | Author: 张三 | Hits:

[Internet-NetworkJIDX

Description: windows系统下用java开发的网络入侵检测程序-windows system with java development of the network intrusion detection procedures
Platform: | Size: 398336 | Author: 刘伟 | Hits:

[Internet-NetworkIDS

Description: 网络入侵检测系统,属于本人毕业设计的一部分,希望大家指正-network intrusion detection system, belonging to my graduation part of the design, we hope that the correction
Platform: | Size: 11264 | Author: | Hits:

[Internet-Networklnids

Description: 这是本人毕业设计.关于网络入侵检测系统的,希望大家看看!-This is my graduation design. On the network intrusion detection system, I hope, we see!
Platform: | Size: 8248320 | Author: liuliang | Hits:

[Industry researchbaseAgent

Description: 文在描述入侵检测技术的相关内容基础上,将移动代理技术引入入侵监测系统,针对成簇ad hoc网络提出了一种基于移动代理的入侵监测系统结构-described in the text intrusion detection technology on the basis of relevant content to mobile agent technology into Intrusion Detection System Clustered against ad hoc network of a mobile agent-based Intrusion Detection System
Platform: | Size: 100352 | Author: joe | Hits:

[Industry researchIDS111223

Description: 针对DIDS网络提出了一种基于移动代理的入侵监测系统结构-against DIDS network presents a Mobile Agent Based Intrusion Detection System
Platform: | Size: 6144 | Author: joe | Hits:

[Internet-Networkiids

Description: 加入了ac_bm匹配并完成了部分界面,还有部分功能有待实现的网络入侵检测系统-joined the ac_bm match and completed a part of the interface, there are some functions to be achieved Network Intrusion Detection System
Platform: | Size: 930816 | Author: yu | Hits:

[source in ebooknids

Description: 网络入侵检测系统的原代码,是对snort的进一步改进和完善-Network Intrusion Detection System s original code, is a snort of further improvement and refinement
Platform: | Size: 2241536 | Author: laizhengwen | Hits:

[Internet-Networkintrusiondetection

Description: 网络入侵检测系统,还需完善,有源代码,能分析数据包-Network intrusion detection system needs to be perfect, active code, capable of analyzing packet
Platform: | Size: 2257920 | Author: lilang | Hits:

[Internet-Networkids

Description: 网络入侵检测系统的源代码 检测网络入侵的存在 数据来源是收集到的dump数据集-Network Intrusion Detection System Network Intrusion Detection of the source code of the existence of the data collected from the dump data sets
Platform: | Size: 13312 | Author: 王佳妮 | Hits:

[Internet-Networkfwmon-1.0.9.tar

Description: firestorm是一个高性能网络入侵检测系统(NIDS)。目前它只有一个传感器,但计划是包括 支持实时分析、报告、远程控制台和快速切换传感器 配置。支持即插即用,非常灵活。执行效率很多比我测试过的其他系统(如如Snort和prelude)高一倍-Firestorm is an extremely high performance network intrusion detection system (NIDS). At the moment it just a sensor but plans are to include real support for analysis, reporting, remote console and on-the-fly sensor configuration. It is fully pluggable and hence extremely flexible. Firestorm performs a lot better than all other systems I have tested (such as snort and prelude) by as much as a factor of 2
Platform: | Size: 30720 | Author: nathun | Hits:

[Windows DevelopAttacksClassificationinAdaptivIntrusion

Description: Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious network-based or host-based attacks by using traditional statistical methods to new data mining approaches in last decades. However, today s commercially available intrusion detection systems are signature-based that are not capable of detecting unknown attacks. In this paper, we present a new learning algorithm for anomaly based network intrusion detection system using decision tree algorithm that distinguishes attacks from normal behaviors and identifies different types of intrusions. Experimental results on the KDD99 benchmark network intrusion detection dataset demonstrate that the proposed learning algorithm achieved 98 detection rate (DR) in comparison with other existing methods.-Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious network-based or host-based attacks by using traditional statistical methods to new data mining approaches in last decades. However, today s commercially available intrusion detection systems are signature-based that are not capable of detecting unknown attacks. In this paper, we present a new learning algorithm for anomaly based network intrusion detection system using decision tree algorithm that distinguishes attacks from normal behaviors and identifies different types of intrusions. Experimental results on the KDD99 benchmark network intrusion detection dataset demonstrate that the proposed learning algorithm achieved 98 detection rate (DR) in comparison with other existing methods.
Platform: | Size: 312320 | Author: keerthi | Hits:

[Windows DevelopFuzzyIntrusionDetectionSystemviaDataMining

Description: There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is built as a hardware product with its own hardware platform (IDS appliance). In this paper, a host based intrusion detection system, that uses the idea of tracing system calls, is introduced. As a program runs, it uses the services of the underlying operating system to do some system calls. This system does not exactly need to know the program codes of each process. Normal and intrusive behaviors are collected with gathering the sequences of system calls for each process. Analysis of data is done via data mining and fuzzy techniques. Data mining is used to extract normal behaviors (normal unique rules) and Fuzzy to enhance intelligence of the System. The proposed system is shown to improve the performance, and decrease size of database, time complexity, and rate of false alarms.-There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is built as a hardware product with its own hardware platform (IDS appliance). In this paper, a host based intrusion detection system, that uses the idea of tracing system calls, is introduced. As a program runs, it uses the services of the underlying operating system to do some system calls. This system does not exactly need to know the program codes of each process. Normal and intrusive behaviors are collected with gathering the sequences of system calls for each process. Analysis of data is done via data mining and fuzzy techniques. Data mining is used to extract normal behaviors (normal unique rules) and Fuzzy to enhance intelligence of the System. The proposed system is shown to improve the performance, and decrease size of database, time complexity, and rate of false alarms.
Platform: | Size: 710656 | Author: keerthi | Hits:

[Software EngineeringIDS

Description: A Java Based Network Intrusion Detection System (IDS)
Platform: | Size: 29696 | Author: idriss | Hits:

[AI-NN-PRBP-Intrusion-Detection-System

Description: 本文详细介绍了BP神经网络在入侵检测系统中的应用及优化。-This paper describes the application and optimization of the BP neural network intrusion detection system.
Platform: | Size: 2117632 | Author: mali | Hits:

[OS programNetwork-Intrusion-Detection-System

Description: linux环境下运行的,以c语言编程的入侵检测系统-running under the linux environment, intrusion detection system to the c programming language
Platform: | Size: 2354176 | Author: wangwang | Hits:

[ExploitIntrusion-Detection-System-Using-Wireshark

Description: Intrusion detection system(IDS) is a device or software application that monitors network and system activities for malicious activities or policy violations and produces report to a management station
Platform: | Size: 646144 | Author: ahmed | Hits:

[Windows DevelopA-HoneyPot-Network-Intrusion-Detection-System

Description: A HoneyPot Network Intrusion Detection System Description: This is a Honey Pot IDS System. It makes it easy to listen on a range of ports and emulate a network protocol to track and identify any monkeys trying to connect to your system. Includes protocol emulation for SubSeven 2.1.5 (crappy protocol), NetBus 1.7 (crappier protocol), and a rendition of Echo. Adding more protocols to emulate should be relatively easy. This allows you to listen on any port not in use and emulate a supported protocol on that port. This file came from Planet-Source-Code.com...the home millions of lines of source code
Platform: | Size: 7168 | Author: sakthivel | Hits:

[Education soft systemIntrusion-Detection-System-master

Description: Intrusion Detection for network security
Platform: | Size: 138240 | Author: aquablue | Hits:

[OS programIntrusion-Detection-System-master

Description: network intrusion detection system
Platform: | Size: 8384512 | Author: tinly | Hits:
« 12 3 4 5 6 7 »

CodeBus www.codebus.net