[go: up one dir, main page]

Kazienko et al., 2003 - Google Patents

Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture)

Kazienko et al., 2003

View PDF
Document ID
8358815489317382163
Author
Kazienko P
Dorosz P
Publication year
Publication venue
Retrieved April

External Links

Snippet

Due to a growing number of intrusions and since the Internet and local networks have become so ubiquitous, organizations increasingly implementing various systems that monitor IT security breaches. Intrusion Detection Systems (IDS) are those that have recently …
Continue reading at ftp.tex-host.ru (PDF) (other versions)

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/19656Network used to communicate with a camera, e.g. WAN, LAN, Internet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Similar Documents

Publication Publication Date Title
Levine et al. The use of honeynets to detect exploited systems across large enterprise networks
US8640234B2 (en) Method and apparatus for predictive and actual intrusion detection on a network
KR102501372B1 (en) AI-based mysterious symptom intrusion detection and system
US20040193943A1 (en) Multiparameter network fault detection system using probabilistic and aggregation analysis
Kazienko et al. Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture)
KR et al. Intrusion detection tools and techniques–a survey
Sayyed et al. Intrusion detection system
Sulieman et al. Detecting zero-day polymorphic worm: A review
Jadidoleslamy Weaknesses, Vulnerabilities and Elusion Strategies Against Intrusion Detection Systems
Pahal et al. Distributed Denial of Services attacks on cloud servers: Detection, Analysis, and Mitigation
Kishore et al. Intrusion detection system a need
Blackwell Ramit-Rule-Based Alert Management Information Tool
Navin et al. A survey on intrusion detection system
Singh et al. A review on intrusion detection system
Harale et al. Network based intrusion detection and prevention systems: Attack classification, methodologies and tools
Verwoerd Active network security
Pasha A Research of Intrusion Detection System in General as Well as Snort in Detail Before Introducing it into Global Cyber Soft Company
Patil et al. Snort, BRO, NetSTAT, Emerald and SAX2: A Comparison.
Saini et al. Extended Honeypot Framework to Detect old/new cyber attacks
Hooper Intelligent autonomic strategy to attacks in network infrastructure protection: Feedback methods to IDS, using policies, alert filters and firewall packet filters for multiple protocols
Sharma et al. Analysis of IDS Tools & Techniques
Ambika et al. Architecture for real time monitoring and modeling of network behavior for enhanced security
Nakato Networks Security: Attacks and Defense Mechanism by Designing an Intelligent Firewall Agent
Palekar et al. Complete Study Of Intrusion Detection System
Bansah et al. Implementation of Intrusion Detection System and Traffic Analysis–A Case of a Linux Platform