期刊文献+
共找到440篇文章
< 1 2 22 >
每页显示 20 50 100
Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment
1
作者 Salaheddine Kably Tajeddine Benbarrad +1 位作者 Nabih Alaoui Mounir Arioua 《Computers, Materials & Continua》 SCIE EI 2023年第1期253-278,共26页
Blockchain merges technology with the Internet of Things(IoT)for addressing security and privacy-related issues.However,conventional blockchain suffers from scalability issues due to its linear structure,which increas... Blockchain merges technology with the Internet of Things(IoT)for addressing security and privacy-related issues.However,conventional blockchain suffers from scalability issues due to its linear structure,which increases the storage overhead,and Intrusion detection performed was limited with attack severity,leading to performance degradation.To overcome these issues,we proposed MZWB(Multi-Zone-Wise Blockchain)model.Initially,all the authenticated IoT nodes in the network ensure their legitimacy by using the Enhanced Blowfish Algorithm(EBA),considering several metrics.Then,the legitimately considered nodes for network construction for managing the network using Bayesian-Direct Acyclic Graph(B-DAG),which considers several metrics.The intrusion detection is performed based on two tiers.In the first tier,a Deep Convolution Neural Network(DCNN)analyzes the data packets by extracting packet flow features to classify the packets as normal,malicious,and suspicious.In the second tier,the suspicious packets are classified as normal or malicious using the Generative Adversarial Network(GAN).Finally,intrusion scenario performed reconstruction to reduce the severity of attacks in which Improved Monkey Optimization(IMO)is used for attack path discovery by considering several metrics,and the Graph cut utilized algorithm for attack scenario reconstruction(ASR).UNSW-NB15 and BoT-IoT utilized datasets for the MZWB method simulated using a Network simulator(NS-3.26).Compared with previous performance metrics such as energy consumption,storage overhead accuracy,response time,attack detection rate,precision,recall,and F-measure.The simulation result shows that the proposed MZWB method achieves high performance than existing works. 展开更多
关键词 IOT multi-zone-wise blockchain intrusion detection and prevention system edge computing network graph construction IDS intrusion scenario reconstruction
下载PDF
Real-Time Network Intrusion Prevention System Using Incremental Feature Generation
2
作者 Yeongje Uhm Wooguil Pak 《Computers, Materials & Continua》 SCIE EI 2022年第1期1631-1648,共18页
Security measures are urgently required to mitigate the recent rapid increase in network security attacks.Although methods employing machine learning have been researched and developed to detect various network attack... Security measures are urgently required to mitigate the recent rapid increase in network security attacks.Although methods employing machine learning have been researched and developed to detect various network attacks effectively,these are passive approaches that cannot protect the network from attacks,but detect them after the end of the session.Since such passive approaches cannot provide fundamental security solutions,we propose an active approach that can prevent further damage by detecting and blocking attacks in real time before the session ends.The proposed technology uses a two-level classifier structure:the first-stage classifier supports real-time classification,and the second-stage classifier supports accurate classification.Thus,the proposed approach can be used to determine whether an attack has occurred with high accuracy,even under heavy traffic.Through extensive evaluation,we confirm that our approach can provide a high detection rate in real time.Furthermore,because the proposed approach is fast,light,and easy to implement,it can be adopted in most existing network security equipment.Finally,we hope to mitigate the limitations of existing security systems,and expect to keep networks faster and safer from the increasing number of cyber-attacks. 展开更多
关键词 Network intrusion detection network intrusion prevention REALTIME two-level classifier
下载PDF
A Comparative Study of Related Technologies of Intrusion Detection &Prevention Systems
3
作者 Indraneel Mukhopadhyay Mohuya Chakraborty Satyajit Chakrabarti 《Journal of Information Security》 2011年第1期28-38,共11页
The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from h... The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from hackers. Up to the moment, researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several available environments. A boundlessness of methods for misuse detection as well as anomaly detection has been applied. Intrusion Prevention Systems (IPS) evolved after that to resolve am-biguities in passive network monitoring by placing detection systems on the line of attack. IPS in other words is IDS that are able to give prevention commands to firewalls and access control changes to routers. IPS can be seen as an improvement upon firewall technologies. It can make access control decisions based on application content, rather than IP address or ports as traditional firewalls do. The next innovation is the combination of IDS and IPS known as Intrusion Detection and Prevention Systems (IDPS) capable of de-tecting and preventing attacks from happening. This paper presents an overview of IDPS followed by their classifications and applications. A new signature based IDPS architecture named HawkEye Solutions has been proposed by the authors. Authors have presented the basic building blocks of the IDS, which include mechanisms for carrying out TCP port scans, Traceroute scan, ping scan and packet sniffing to monitor net-work health detect various types of attacks. Real time implementation results of the system have been pre-sented. Finally a comparative analysis of various existing IDS/IPS solutions with HawkEye Solutions em-phasizes its significance. 展开更多
关键词 ADVANCES of Network Security intrusion Detection SYSTEM intrusion prevention SYSTEM Haw-kEye Solutions
下载PDF
Hardware Realization of Artificial Neural Network Based Intrusion Detection &Prevention System
4
作者 Indraneel Mukhopadhyay Mohuya Chakraborty 《Journal of Information Security》 2014年第4期154-165,共12页
In the 21st century with the exponential growth of the Internet, the vulnerability of the network which connects us is on the rise at a very fast pace. Today organizations are spending millions of dollars to protect t... In the 21st century with the exponential growth of the Internet, the vulnerability of the network which connects us is on the rise at a very fast pace. Today organizations are spending millions of dollars to protect their sensitive data from different vulnerabilities that they face every day. In this paper, a new methodology towards implementing an Intrusion Detection & Prevention System (IDPS) based on Artificial Neural Network (ANN) onto Field Programmable Gate Array (FPGA) is proposed. This system not only detects different network attacks but also prevents them from being propagated. The parallel structure of an ANN makes it potentially fast for the computation of certain tasks. FPGA platforms are the optimum and best choice for the modern digital systems nowadays. The same feature makes ANN well suited for implementation in FPGA technology. Hardware realization of ANN to a large extent depends on the efficient implementation of a single neuron. However FPGA realization of ANNs with a large number of neurons is still a challenging task. The proposed multilayer ANN based IDPS uses multiple neurons for higher performance and greater accuracy. Simulation of the design in MATLAB SIMULINK 2010b by using Knowledge Discovery and Data Mining (KDD) CUP dataset shows a very good performance. Subsequently MATLAB HDL coder was used to generate VHDL code for the proposed design that produced Intellectual Property (IP) cores for Xilinx Targeted Design Platforms. For evaluation purposes the proposed design was synthesized, implemented and tested onto Xilinx Virtex-7 2000T FPGA device. 展开更多
关键词 Artificial Neural Network FEED Forward Multilayer ANN intrusion Detection & prevention System FPGA VHDL VIRTEX 7
下载PDF
Study on the Status Quo and Prevention-control Measures of Seawater Intrusion in Qingdao City
5
作者 SUN Jian-ming LI Jia-jia GAO Zong-jun 《Meteorological and Environmental Research》 CAS 2012年第12期46-49,共4页
Firstly, the general situation, influencing factors and damage of seawater intrusion in Qingdao City, Shandong Province were analyzed, and then some appropriate remedial measures were put forward, such as improving gr... Firstly, the general situation, influencing factors and damage of seawater intrusion in Qingdao City, Shandong Province were analyzed, and then some appropriate remedial measures were put forward, such as improving groundwater monitoring system in costal areas, exploiting groundwater reasonably, building underground cut-off walls and strengthening river management, which would provide a new approach for the prevention and control of seawater intrusion in Qingdao City. 展开更多
关键词 Qingdao City Seawater intrusion Current situation Influencing factor prevention-control measures China
下载PDF
Coastal groundwater resources development for prevention of sea water intrusion
6
《Global Geology》 1998年第1期20-20,共1页
关键词 Coastal groundwater resources development for prevention of sea water intrusion
下载PDF
The prevention and cure study of sea water intrusion caused during the groundwate rresources exploitation in Daliancity
7
《Global Geology》 1998年第1期18-19,共2页
关键词 The prevention and cure study of sea water intrusion caused during the groundwate rresources exploitation in Daliancity
下载PDF
Internet of things intrusion detection model and algorithm based on cloud computing and multi-feature extraction extreme learning machine 被引量:1
8
作者 Haifeng Lin Qilin Xue +1 位作者 Jiayin Feng Di Bai 《Digital Communications and Networks》 SCIE CSCD 2023年第1期111-124,共14页
With the rapid development of the Internet of Things(IoT),there are several challenges pertaining to security in IoT applications.Compared with the characteristics of the traditional Internet,the IoT has many problems... With the rapid development of the Internet of Things(IoT),there are several challenges pertaining to security in IoT applications.Compared with the characteristics of the traditional Internet,the IoT has many problems,such as large assets,complex and diverse structures,and lack of computing resources.Traditional network intrusion detection systems cannot meet the security needs of IoT applications.In view of this situation,this study applies cloud computing and machine learning to the intrusion detection system of IoT to improve detection performance.Usually,traditional intrusion detection algorithms require considerable time for training,and these intrusion detection algorithms are not suitable for cloud computing due to the limited computing power and storage capacity of cloud nodes;therefore,it is necessary to study intrusion detection algorithms with low weights,short training time,and high detection accuracy for deployment and application on cloud nodes.An appropriate classification algorithm is a primary factor for deploying cloud computing intrusion prevention systems and a prerequisite for the system to respond to intrusion and reduce intrusion threats.This paper discusses the problems related to IoT intrusion prevention in cloud computing environments.Based on the analysis of cloud computing security threats,this study extensively explores IoT intrusion detection,cloud node monitoring,and intrusion response in cloud computing environments by using cloud computing,an improved extreme learning machine,and other methods.We use the Multi-Feature Extraction Extreme Learning Machine(MFE-ELM)algorithm for cloud computing,which adds a multi-feature extraction process to cloud servers,and use the deployed MFE-ELM algorithm on cloud nodes to detect and discover network intrusions to cloud nodes.In our simulation experiments,a classical dataset for intrusion detection is selected as a test,and test steps such as data preprocessing,feature engineering,model training,and result analysis are performed.The experimental results show that the proposed algorithm can effectively detect and identify most network data packets with good model performance and achieve efficient intrusion detection for heterogeneous data of the IoT from cloud nodes.Furthermore,it can enable the cloud server to discover nodes with serious security threats in the cloud cluster in real time,so that further security protection measures can be taken to obtain the optimal intrusion response strategy for the cloud cluster. 展开更多
关键词 Internet of Things Cloud Computing intrusion prevention intrusion Detection Extreme Learning Machine
下载PDF
A Method for Detecting Intrusion on Networks in Real-time Based on IP Weight
9
作者 黄本雄 Lu +2 位作者 Wei Huang Zailu 《High Technology Letters》 EI CAS 2001年第2期34-38,共5页
A new rule to detect intrusion based on IP weight, which is also well implemented in the rule base of author’s NMS, is presented. Compared with traditional ones, intrusion detecting based on IP weight enhanced analys... A new rule to detect intrusion based on IP weight, which is also well implemented in the rule base of author’s NMS, is presented. Compared with traditional ones, intrusion detecting based on IP weight enhanced analysis to packet content. The method also provides a real-time efficient way to analyze traffic on high-speed network and can help to increase valid usage rates of network resources. Practical implementation as a rule in the rule base of our NMS has verified that the rule can detect not only attacks on network, but also other unusual behaviors. 展开更多
关键词 Network security intrusion detecting ip weight Detection of attacks Real-time analysis
下载PDF
基于IP通信频次特征的资产发现及入侵检测分析研究
10
作者 张绳武 《长江信息通信》 2024年第7期198-200,219,共4页
文章介绍了利用IP通信频次特征对目标资产进行拓展发现、可用性监测、入侵检测、行为分析等方面的研究。首先介绍了国内外关于IP通信频次特征分析的研究现状,然后阐述了IP通信频次特征分析技术特点以及相关应用方向。接着,详细介绍了实... 文章介绍了利用IP通信频次特征对目标资产进行拓展发现、可用性监测、入侵检测、行为分析等方面的研究。首先介绍了国内外关于IP通信频次特征分析的研究现状,然后阐述了IP通信频次特征分析技术特点以及相关应用方向。接着,详细介绍了实验的数据收集、分析、特征提取、判断验证等过程以及最终的实验结果。最后,对研究结果进行了总结,分析了可取之处以及存在的不足,并提出了改进方向的相关建议。 展开更多
关键词 ip通信频次 特征提取 资产发现 入侵检测
下载PDF
辐状节点链接图在IPS日志分析中的研究与应用 被引量:1
11
作者 张胜 施荣华 赵珏 《中南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2017年第7期1774-1781,共8页
为了提高IPS(入侵防御系统)日志分析的效率和精准度,提出一种辐状节点链接图可视化分析方法。针对经典节点链接图随着数据量增加,节点变得拥挤、层次难以区分、空间利用率不高等问题,结合节点链接图和辐射图的优势,设计一种新的可视化... 为了提高IPS(入侵防御系统)日志分析的效率和精准度,提出一种辐状节点链接图可视化分析方法。针对经典节点链接图随着数据量增加,节点变得拥挤、层次难以区分、空间利用率不高等问题,结合节点链接图和辐射图的优势,设计一种新的可视化技术变形即辐状节点链接图。分析VAST 2013 Challenge比赛中IPS日志。研究结果表明:在大数据环境下,该技术能够合理分布节点以区分不同维度的IPS属性,利用可视化筛选降低图像密度,改进布局算法以合理利用显示面积以及产生图形的聚类;该方法能有效地感知网络安全态势,辅助分析人员决策;该辐状节点链接图的数据维度表现能力和业务层次控制能力较强。 展开更多
关键词 节点链接图 辐射图 网络安全日志 入侵防御系统 可视化分析
下载PDF
谈入侵防御系统(IPS)及其在图书馆中的应用 被引量:3
12
作者 卢福 《大学图书情报学刊》 2008年第5期34-37,共4页
入侵防御系统(IPS)是一种新型的网络安全系统,它是一种主支的、智能的入侵检测和防范阻止系统。在数字化和网络化图书馆网络中引入入侵防御系统(IPS),在网络安全中起着积极防御的作用。
关键词 网络安全 入侵防御系统(ips) 图书馆
下载PDF
基于MA及LVQ神经网络的智能NIPS模型与实现 被引量:3
13
作者 贾铁军 刘泓漫 《小型微型计算机系统》 CSCD 北大核心 2012年第8期1836-1840,共5页
为了提高入侵防御系统的智能性和准确率,在讨论入侵防御技术特性和关键技术的基础上,分析了利用MA(MobileAgent)及LVQ(Learning Vector Quantization)神经网络构建入侵防御系统的优势,以及LVQ神经网络的结构特性和学习算法,提出基于MA及... 为了提高入侵防御系统的智能性和准确率,在讨论入侵防御技术特性和关键技术的基础上,分析了利用MA(MobileAgent)及LVQ(Learning Vector Quantization)神经网络构建入侵防御系统的优势,以及LVQ神经网络的结构特性和学习算法,提出基于MA及LVQ神经网络的新智能入侵防御系统模型结构,概述了新模型的实现方法,并用Matlab算法进行了仿真实验.结果表明,基于MA及LVQ神经网络的新智能入侵防御系统模型整体防御准确率与检测辨识性能都有较大提高. 展开更多
关键词 移动代理MA 学习向量量化LVQ LVQ神经网络 基于网络的入侵防御系统Nips 模型构建与实现
下载PDF
危险信号协同作用的自适应IPS研究与设计
14
作者 徐慧 徐晨 +1 位作者 程学云 彭志娟 《计算机工程》 CAS CSCD 北大核心 2009年第2期172-174,186,共4页
入侵防御系统是网络安全领域为弥补防火墙及入侵检测系统的不足而发展起来的一种计算机信息安全技术。其嵌入式的工作方式,使其面临许多挑战,如数据流检测瓶颈、误报和漏报等。该文陈述基于粗糙集理论的危险评测方法和该信号的协同作用... 入侵防御系统是网络安全领域为弥补防火墙及入侵检测系统的不足而发展起来的一种计算机信息安全技术。其嵌入式的工作方式,使其面临许多挑战,如数据流检测瓶颈、误报和漏报等。该文陈述基于粗糙集理论的危险评测方法和该信号的协同作用下防御及检测器的进化机制。提出以通过评估保护对象所受危险并以此信号协同检测的防御方法,可以提高检测效率和防御效果,降低误报和漏报。 展开更多
关键词 入侵防御 危险检测 自适应
下载PDF
基于免疫DND的IPS触发机制研究
15
作者 徐慧 管致锦 程学云 《计算机应用研究》 CSCD 北大核心 2009年第7期2722-2725,共4页
基于免疫DND理论,研究网络入侵防御系统的触发机制及其构建问题,提出从受害方受到的危险进行攻击的可进化分级检测与分级触发响应防御的方法。该方法为解决攻击检测中的度量问题提供了一个新的思路,且便于建立轻量级的、自适应的、分布... 基于免疫DND理论,研究网络入侵防御系统的触发机制及其构建问题,提出从受害方受到的危险进行攻击的可进化分级检测与分级触发响应防御的方法。该方法为解决攻击检测中的度量问题提供了一个新的思路,且便于建立轻量级的、自适应的、分布的入侵防御系统。 展开更多
关键词 入侵防御 免疫 DND
下载PDF
基于移动Agent和数据挖掘的智能NIPS模型 被引量:1
16
作者 贾铁军 王中华 《上海电机学院学报》 2009年第3期208-211,共4页
在分析入侵防御系统、移动Agent和数据挖掘技术特点及优势的基础上,提出了基于移动Agent和数据挖掘的新智能NIPS模型。利用移动Agent的特点,结合数据挖掘所具有的实时提取和辨识异常信息的优势,解决NIPS数据收集单一的不足,及时更新检... 在分析入侵防御系统、移动Agent和数据挖掘技术特点及优势的基础上,提出了基于移动Agent和数据挖掘的新智能NIPS模型。利用移动Agent的特点,结合数据挖掘所具有的实时提取和辨识异常信息的优势,解决NIPS数据收集单一的不足,及时更新检测规则库,有效地解决网络安全漏检和误报问题,从而提高系统的检测辨识决策和整体智能防御功效。 展开更多
关键词 移动代理 数据挖掘 入侵防御系统 Nips模型
下载PDF
多移动代理协同智能NIPS的结构设计 被引量:1
17
作者 贾铁军 王海军 《上海电机学院学报》 2010年第4期219-222,231,共5页
分析了移动代理(MA)和网络入侵防御系统(NIPS)特点,利用协同式MA的特性和辨识异常信息的优势,集成协同技术、移动代理技术和网络检测防御技术,构建了一种新型基于多MA协同智能NIPS结构,改进了传统检测防御方法整体防御能力弱和检测误漏... 分析了移动代理(MA)和网络入侵防御系统(NIPS)特点,利用协同式MA的特性和辨识异常信息的优势,集成协同技术、移动代理技术和网络检测防御技术,构建了一种新型基于多MA协同智能NIPS结构,改进了传统检测防御方法整体防御能力弱和检测误漏报等问题,提高了NIPS的智能检测辨识阻断和整体协同防御能力。 展开更多
关键词 移动代理 协同式 网络入侵防御系统 结构设计
下载PDF
主动网络技术及其在IPS中的应用研究 被引量:1
18
作者 潘峰 《微计算机信息》 2009年第33期135-137,共3页
主动网络技术是一种动态可编程的网络体系结构。将主动网络技术应用于IPS(入侵防御系统),利用主动节点的可编程特性,设计了一个分布式的新型IPS,系统中多个节点协同完成入侵检测过程,提高了检测的准确率和效率。
关键词 主动网络 入侵防御系统 分布式
下载PDF
IPS在图书馆网络安全防护中的应用研究
19
作者 张亮 《山东理工大学学报(自然科学版)》 CAS 2007年第6期104-107,共4页
在分析防火墙和入侵检测系统在网络安全防护方面缺陷的基础上,提出使用一种新改进的网络安全防护方法——入侵防御系统,分析了这种新的安全防护技术的工作原理、技术特征和优势以及面临的问题及发展前景.
关键词 入侵防御系统 入侵防御 ips 网络安全
下载PDF
基于思科路由器的IPS实现
20
作者 任毅 《实验科学与技术》 2013年第4期60-62,共3页
随着网络入侵事件的不断增加和黑客攻击水平的不断提高,传统的防火墙或入侵检测系统(IDS)显得力不从心,这就需要能够检测入侵行为并做出保护的系统来实现网络安全。近年来兴起的入侵防御系统(IPS)就能够实现这样的功能,它根据网络攻击... 随着网络入侵事件的不断增加和黑客攻击水平的不断提高,传统的防火墙或入侵检测系统(IDS)显得力不从心,这就需要能够检测入侵行为并做出保护的系统来实现网络安全。近年来兴起的入侵防御系统(IPS)就能够实现这样的功能,它根据网络攻击的特征行为定义出相应的特征库,当检测到攻击行为时,便采取定义好的动作来保护网络的安全。低版本的思科路由器不具备IPS功能,高版本的思科路由器IOS中增加了这一功能。文中通过配置思科路由器实现入侵保护,维护网络安全。 展开更多
关键词 网络攻击 入侵防御 特征库 黑客攻击
下载PDF
上一页 1 2 22 下一页 到第
使用帮助 返回顶部