期刊文献+

Study of Intrusion Detection Systems

Study of Intrusion Detection Systems
下载PDF
导出
摘要 Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of weB-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors. Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of weB-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors.
出处 《Journal of Electronic Science and Technology》 CAS 2012年第3期269-275,共7页 电子科技学刊(英文版)
关键词 Anomaly detection detection systems misuse detection mobilevulnerability wireless.intrusionsecurity Anomaly detection,detection systems, misuse detection, mobilevulnerability, wireless.intrusionsecurity,
  • 相关文献

参考文献3

二级参考文献22

  • 1P. Paul,M. Monwar."Human iris recognition for biometric identification,"[].Proc of the th International Conference on Computer and Information Technology.2007
  • 2A. M. Sarhan."Iris recognition using discrete cosine transform and artificial neural networks,"[].Journal of Computer Science.2009
  • 3H.-T. Yin,P. Fu."Face recognition based on DCT and 2DLDA,"[].Proc of the Second International Conference on Innovative ComputingInformation and Control.2007
  • 4H. B. Kekre,T. K. Sarode."New fast improved clustering algorithm for codebook generation for vector quantization,"[].Proc of International Conf on Engineering Technologies and Applications in EngineeringTechnology and Sciences.2008
  • 5H. B. Kekre,T. K. Sarode."New fast improved codebook generation algorithm for color images using vector quantization,"[].International Journal of Engineering and Technology.2008
  • 6H. B. Kekre,T. K. Sarode."Fast codebook generation algorithm for color images using vector quantization,"[].International Journal of Computer Science and Information Technology.2009
  • 7H. B. Kekre,T. K. Sarode."Fast codevector search algorithm for 3-D vector quantized codebook"[].WASET International Journal of Computer Information Science and Engineering.2008
  • 8H. B. Kekre,T. K. Sarode."Fast codebook search algorithm for vector quantization using sorting technique,"[].Proc of ACM International Conference on Advances in ComputingCommunication and Control.2009
  • 9J. Z. C. Lai,Y.-C. Liaw,J.-L. Liu."A fast VQ codebook generation algorithm using codeword displacement,"[].Pattern Recognition.2008
  • 10H. Y. M. Liao,,D.-Y. Chen,,C.-W. Su,,H.-R. Tyan."Real-time event detection and its applications to surveillance systems,"[].Proc of IEEE Int Symp Circuits and Systems.2006

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部