期刊文献+
共找到138篇文章
< 1 2 7 >
每页显示 20 50 100
Multi-Zone-Wise Blockchain Based Intrusion Detection and Prevention System for IoT Environment
1
作者 Salaheddine Kably Tajeddine Benbarrad +1 位作者 Nabih Alaoui Mounir Arioua 《Computers, Materials & Continua》 SCIE EI 2023年第1期253-278,共26页
Blockchain merges technology with the Internet of Things(IoT)for addressing security and privacy-related issues.However,conventional blockchain suffers from scalability issues due to its linear structure,which increas... Blockchain merges technology with the Internet of Things(IoT)for addressing security and privacy-related issues.However,conventional blockchain suffers from scalability issues due to its linear structure,which increases the storage overhead,and Intrusion detection performed was limited with attack severity,leading to performance degradation.To overcome these issues,we proposed MZWB(Multi-Zone-Wise Blockchain)model.Initially,all the authenticated IoT nodes in the network ensure their legitimacy by using the Enhanced Blowfish Algorithm(EBA),considering several metrics.Then,the legitimately considered nodes for network construction for managing the network using Bayesian-Direct Acyclic Graph(B-DAG),which considers several metrics.The intrusion detection is performed based on two tiers.In the first tier,a Deep Convolution Neural Network(DCNN)analyzes the data packets by extracting packet flow features to classify the packets as normal,malicious,and suspicious.In the second tier,the suspicious packets are classified as normal or malicious using the Generative Adversarial Network(GAN).Finally,intrusion scenario performed reconstruction to reduce the severity of attacks in which Improved Monkey Optimization(IMO)is used for attack path discovery by considering several metrics,and the Graph cut utilized algorithm for attack scenario reconstruction(ASR).UNSW-NB15 and BoT-IoT utilized datasets for the MZWB method simulated using a Network simulator(NS-3.26).Compared with previous performance metrics such as energy consumption,storage overhead accuracy,response time,attack detection rate,precision,recall,and F-measure.The simulation result shows that the proposed MZWB method achieves high performance than existing works. 展开更多
关键词 IOT multi-zone-wise blockchain intrusion detection and prevention system edge computing network graph construction IDS intrusion scenario reconstruction
下载PDF
Real-Time Network Intrusion Prevention System Using Incremental Feature Generation
2
作者 Yeongje Uhm Wooguil Pak 《Computers, Materials & Continua》 SCIE EI 2022年第1期1631-1648,共18页
Security measures are urgently required to mitigate the recent rapid increase in network security attacks.Although methods employing machine learning have been researched and developed to detect various network attack... Security measures are urgently required to mitigate the recent rapid increase in network security attacks.Although methods employing machine learning have been researched and developed to detect various network attacks effectively,these are passive approaches that cannot protect the network from attacks,but detect them after the end of the session.Since such passive approaches cannot provide fundamental security solutions,we propose an active approach that can prevent further damage by detecting and blocking attacks in real time before the session ends.The proposed technology uses a two-level classifier structure:the first-stage classifier supports real-time classification,and the second-stage classifier supports accurate classification.Thus,the proposed approach can be used to determine whether an attack has occurred with high accuracy,even under heavy traffic.Through extensive evaluation,we confirm that our approach can provide a high detection rate in real time.Furthermore,because the proposed approach is fast,light,and easy to implement,it can be adopted in most existing network security equipment.Finally,we hope to mitigate the limitations of existing security systems,and expect to keep networks faster and safer from the increasing number of cyber-attacks. 展开更多
关键词 network intrusion detection network intrusion prevention REALTIME two-level classifier
下载PDF
Hardware Realization of Artificial Neural Network Based Intrusion Detection &Prevention System
3
作者 Indraneel Mukhopadhyay Mohuya Chakraborty 《Journal of Information Security》 2014年第4期154-165,共12页
In the 21st century with the exponential growth of the Internet, the vulnerability of the network which connects us is on the rise at a very fast pace. Today organizations are spending millions of dollars to protect t... In the 21st century with the exponential growth of the Internet, the vulnerability of the network which connects us is on the rise at a very fast pace. Today organizations are spending millions of dollars to protect their sensitive data from different vulnerabilities that they face every day. In this paper, a new methodology towards implementing an Intrusion Detection & Prevention System (IDPS) based on Artificial Neural Network (ANN) onto Field Programmable Gate Array (FPGA) is proposed. This system not only detects different network attacks but also prevents them from being propagated. The parallel structure of an ANN makes it potentially fast for the computation of certain tasks. FPGA platforms are the optimum and best choice for the modern digital systems nowadays. The same feature makes ANN well suited for implementation in FPGA technology. Hardware realization of ANN to a large extent depends on the efficient implementation of a single neuron. However FPGA realization of ANNs with a large number of neurons is still a challenging task. The proposed multilayer ANN based IDPS uses multiple neurons for higher performance and greater accuracy. Simulation of the design in MATLAB SIMULINK 2010b by using Knowledge Discovery and Data Mining (KDD) CUP dataset shows a very good performance. Subsequently MATLAB HDL coder was used to generate VHDL code for the proposed design that produced Intellectual Property (IP) cores for Xilinx Targeted Design Platforms. For evaluation purposes the proposed design was synthesized, implemented and tested onto Xilinx Virtex-7 2000T FPGA device. 展开更多
关键词 Artificial Neural network FEED FORWARD MULTILAYER ANN intrusion Detection & prevention System FPGA VHDL VIRTEX 7
下载PDF
A Comparative Study of Related Technologies of Intrusion Detection &Prevention Systems
4
作者 Indraneel Mukhopadhyay Mohuya Chakraborty Satyajit Chakrabarti 《Journal of Information Security》 2011年第1期28-38,共11页
The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from h... The rapid growth of computer networks has changed the prospect of network security. An easy accessibility condition causes computer networks to be vulnerable against numerous and potentially devastating threats from hackers. Up to the moment, researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several available environments. A boundlessness of methods for misuse detection as well as anomaly detection has been applied. Intrusion Prevention Systems (IPS) evolved after that to resolve am-biguities in passive network monitoring by placing detection systems on the line of attack. IPS in other words is IDS that are able to give prevention commands to firewalls and access control changes to routers. IPS can be seen as an improvement upon firewall technologies. It can make access control decisions based on application content, rather than IP address or ports as traditional firewalls do. The next innovation is the combination of IDS and IPS known as Intrusion Detection and Prevention Systems (IDPS) capable of de-tecting and preventing attacks from happening. This paper presents an overview of IDPS followed by their classifications and applications. A new signature based IDPS architecture named HawkEye Solutions has been proposed by the authors. Authors have presented the basic building blocks of the IDS, which include mechanisms for carrying out TCP port scans, Traceroute scan, ping scan and packet sniffing to monitor net-work health detect various types of attacks. Real time implementation results of the system have been pre-sented. Finally a comparative analysis of various existing IDS/IPS solutions with HawkEye Solutions em-phasizes its significance. 展开更多
关键词 ADVANCES of network Security intrusion Detection SYSTEM intrusion prevention SYSTEM Haw-kEye Solutions
下载PDF
基于MA及LVQ神经网络的智能NIPS模型与实现 被引量:3
5
作者 贾铁军 刘泓漫 《小型微型计算机系统》 CSCD 北大核心 2012年第8期1836-1840,共5页
为了提高入侵防御系统的智能性和准确率,在讨论入侵防御技术特性和关键技术的基础上,分析了利用MA(MobileAgent)及LVQ(Learning Vector Quantization)神经网络构建入侵防御系统的优势,以及LVQ神经网络的结构特性和学习算法,提出基于MA及... 为了提高入侵防御系统的智能性和准确率,在讨论入侵防御技术特性和关键技术的基础上,分析了利用MA(MobileAgent)及LVQ(Learning Vector Quantization)神经网络构建入侵防御系统的优势,以及LVQ神经网络的结构特性和学习算法,提出基于MA及LVQ神经网络的新智能入侵防御系统模型结构,概述了新模型的实现方法,并用Matlab算法进行了仿真实验.结果表明,基于MA及LVQ神经网络的新智能入侵防御系统模型整体防御准确率与检测辨识性能都有较大提高. 展开更多
关键词 移动代理MA 学习向量量化LVQ LVQ神经网络 基于网络的入侵防御系统nips 模型构建与实现
下载PDF
多移动代理协同智能NIPS的结构设计 被引量:1
6
作者 贾铁军 王海军 《上海电机学院学报》 2010年第4期219-222,231,共5页
分析了移动代理(MA)和网络入侵防御系统(NIPS)特点,利用协同式MA的特性和辨识异常信息的优势,集成协同技术、移动代理技术和网络检测防御技术,构建了一种新型基于多MA协同智能NIPS结构,改进了传统检测防御方法整体防御能力弱和检测误漏... 分析了移动代理(MA)和网络入侵防御系统(NIPS)特点,利用协同式MA的特性和辨识异常信息的优势,集成协同技术、移动代理技术和网络检测防御技术,构建了一种新型基于多MA协同智能NIPS结构,改进了传统检测防御方法整体防御能力弱和检测误漏报等问题,提高了NIPS的智能检测辨识阻断和整体协同防御能力。 展开更多
关键词 移动代理 协同式 网络入侵防御系统 结构设计
下载PDF
基于移动Agent和数据挖掘的智能NIPS模型 被引量:1
7
作者 贾铁军 王中华 《上海电机学院学报》 2009年第3期208-211,共4页
在分析入侵防御系统、移动Agent和数据挖掘技术特点及优势的基础上,提出了基于移动Agent和数据挖掘的新智能NIPS模型。利用移动Agent的特点,结合数据挖掘所具有的实时提取和辨识异常信息的优势,解决NIPS数据收集单一的不足,及时更新检... 在分析入侵防御系统、移动Agent和数据挖掘技术特点及优势的基础上,提出了基于移动Agent和数据挖掘的新智能NIPS模型。利用移动Agent的特点,结合数据挖掘所具有的实时提取和辨识异常信息的优势,解决NIPS数据收集单一的不足,及时更新检测规则库,有效地解决网络安全漏检和误报问题,从而提高系统的检测辨识决策和整体智能防御功效。 展开更多
关键词 移动代理 数据挖掘 入侵防御系统 nips模型
下载PDF
基于NIPS的网络安全系统建设
8
作者 张红霞 郭宝财 《内蒙古民族大学学报(自然科学版)》 2009年第6期635-637,共3页
首先进行了网络安全形势的分析,然后对入侵防御系统的概念和特点进行分析,同时介绍了它的弱点,在对NIPS的工作原理进行了阐述,最后就基于NIPS的网络安全建设进行详细的论述.
关键词 入侵防御系统 nips 网络安全 部署
下载PDF
A parameterized multilevel pattern matching architecture on FPGAs for network intrusion detection and prevention 被引量:1
9
作者 SONG Tian WANG DongSheng TANG ZhiZhong 《Science in China(Series F)》 2009年第6期949-963,共15页
Pattern matching is one of the most performance-critical components for the content inspection based applications of network security, such as network intrusion detection and prevention.To keep up with the increasing ... Pattern matching is one of the most performance-critical components for the content inspection based applications of network security, such as network intrusion detection and prevention.To keep up with the increasing speed network, this component needs to be accelerated by well designed custom coprocessor.This paper presents a parameterized multilevel pattern matching architecture (MPM) which is used on FPGAs.To achieve less chip area, the architecture is designed based on the idea of selected character decoding (SCD) and multilevel method which are analyzed in detail.This paper also proposes an MPM generator that can generate RTL-level codes of MPM by giving a pattern set and predefined parameters.With the generator, the efficient MPM architecture can be generated and embedded to a total hardware solution.The third contribution is a mathematical model and formula to estimate the chip area for each MPM before it is generated, which is useful for choosing the proper type of FPGAs.One example MPM architecture is implemented by giving 1785 patterns of Snort on Xilinx Virtex 2 Pro FPGA.The results show that this MPM can achieve 4.3 Gbps throughput with 5 stages of pipelines and 0.22 slices per character, about one half chip area of the most area-efficient architecture in literature.Other results are given to show that MPM is also efficient for general random pattern sets.The performance of MPM can be scalable near linearly, potential for more than 100 Gbps throughput. 展开更多
关键词 network intrusion detection network intrusion prevention pattern matching network security
原文传递
线性工程智能反入侵系统分析与设计
10
作者 郑中 《国防交通工程与技术》 2024年第2期7-10,26,共5页
我国疆域辽阔,铁路、公路等长大线性工程众多,各类线性工程反入侵形势严峻。由于线性入侵具有突发性、随机性等特点,传统阻拦设施使用单一传感器难以实现有效防护。设计了一套基于多传感器融合的智能反入侵系统,包括前端感知子系统、网... 我国疆域辽阔,铁路、公路等长大线性工程众多,各类线性工程反入侵形势严峻。由于线性入侵具有突发性、随机性等特点,传统阻拦设施使用单一传感器难以实现有效防护。设计了一套基于多传感器融合的智能反入侵系统,包括前端感知子系统、网络通信子系统、软件平台子系统;介绍了各子系统的组成、工作流程和具体功能。系统综合利用人工智能、物联网等先进技术,可有效降低长大线性工程入侵误报率,大幅降低人工核查工作量,实现长大线性工程入侵行为的有效防范。 展开更多
关键词 线性工程 智能反入侵 安全防范 多传感器融合 前端感知 网络通信 软件平台
下载PDF
Effect of Network Traffic on IPS Performance
11
作者 Shahriar Mohammadi Vahid Allahvakil Mojtaba Khaghani 《Journal of Information Security》 2012年第2期162-168,共7页
The importance of network security has grown tremendously and intrusion prevention/detection systems (IPS/IDS) have been widely developed to insure the security of network against suspicious threat. Computer network i... The importance of network security has grown tremendously and intrusion prevention/detection systems (IPS/IDS) have been widely developed to insure the security of network against suspicious threat. Computer network intrusion detection and prevention system consist of collecting traffic data, analyzing them based on detection rules and generate alerts or dropping them if necessary. However IPS has problems such as accuracy signature, the traffic volume, topology design, monitoring sensors. In this paper, we practically examine the traffic effect on performance of IPS. We first examine the detection of DOS attack on a web server by IPS and then we generate network traffic to see how the behavior of IPS has influenced on detection of DOS attack. 展开更多
关键词 network Security network intrusion Detection and prevention System DOS ATTACK network TRAFFIC Generation
下载PDF
Security of Computer Network and Measures of Defense
12
作者 何德明 《电脑知识与技术(过刊)》 2011年第7X期4819-4824,4837,共7页
Along with the deepening of the reform and opening-up policy and the entering of the WTO,international exchange of economy and culture has become more and more frequent,Internet has become an indispensable part of our... Along with the deepening of the reform and opening-up policy and the entering of the WTO,international exchange of economy and culture has become more and more frequent,Internet has become an indispensable part of our life,its rapid development brings great convenience to us,and all of the computers will be connected by Internet in the 21 century,thus the meaning of information security has changed substantially.It not only changes from a general guarding to a common defence,but from a specific field to a public subject as well.However,the opening and sharing of the Internet resource,unefficient supervision as well as various virus make people's information and belongings being in an extremely dangerous environment.The fight between hackers and anti-hackers,destruction and anti-destruction has already affected the stable running of the network and users' legal right,caused great economy damages and it could also threat our country's security.So a right understanding and in-time measures should be paid special attention to.The thesis firstly expatiates the current state of the network security and its importance,and discusses some major factors and threats that affect the network security.And the thesis also introduce some catalogues of the security techniques,some relevant information and their major characters,besides that,I enumerate some popular and effective methods of protecting our network,including the widely used firewall,and the meticulous techniques such as security scan techniques and techniques of intrusion detection.Lastly,some protective measures are stated. 展开更多
关键词 network Security FIREWALL security scan techniques techniques of intrusion detection prevention Strategy
下载PDF
新媒体时代下信息通信网络安全防护形式探讨 被引量:1
13
作者 蔡剑 《数字通信世界》 2023年第9期44-46,138,共4页
为了解信息通信网络安全现状并制订保护策略,促进新媒体时代下信息通信网络相关企业的持续发展,文章将以现代信息通信网络安全防护技术要点为研究课题,详细论述网络安全防护的内容,通过打造平台、更新技术、优化系统设计、风险检测算法... 为了解信息通信网络安全现状并制订保护策略,促进新媒体时代下信息通信网络相关企业的持续发展,文章将以现代信息通信网络安全防护技术要点为研究课题,详细论述网络安全防护的内容,通过打造平台、更新技术、优化系统设计、风险检测算法等方式对信息通信网络进行加密、设置访问权限,保护信息通信网络用户的个人隐私,促进社会信息安全持续发展。 展开更多
关键词 数据库 入侵防护 通信网络 新媒体
下载PDF
现形势下我国网络安全保护现状及改进策略研究
14
作者 李小东 谢伟云 梁瑞 《科技资讯》 2023年第14期32-35,共4页
当前信息技术的发展不仅推动各项事务实现了电子化,也给网络安全带来了更多风险隐患,对国家与公众的发展也会形成直接威胁。该文在分析网络安全保护对于网络安全技术、信息安全等积极意义的基础上,总结了当前我国网络安全保护在机制与... 当前信息技术的发展不仅推动各项事务实现了电子化,也给网络安全带来了更多风险隐患,对国家与公众的发展也会形成直接威胁。该文在分析网络安全保护对于网络安全技术、信息安全等积极意义的基础上,总结了当前我国网络安全保护在机制与技术等现状,主要针对突出问题提出了几点有针对性的改进建议,希望对我国网络安全保护水平的提高有一定帮助。 展开更多
关键词 网络安全 信息安全 入侵防御 防火墙
下载PDF
DVWA网络空间安全实验环境搭建
15
作者 刘木友 《无线互联科技》 2023年第14期138-140,共3页
Web技术在电商、保险、传媒、金融等领域得到广泛的应用。网络的开放性和经济利益的驱动,导致一些新的网络空间安全风险出现,增加了网络空间安全人才的需求。文章从DVWA Web应用程序的实验实训环境要求出发,配置主机和靶机服务器软硬件... Web技术在电商、保险、传媒、金融等领域得到广泛的应用。网络的开放性和经济利益的驱动,导致一些新的网络空间安全风险出现,增加了网络空间安全人才的需求。文章从DVWA Web应用程序的实验实训环境要求出发,配置主机和靶机服务器软硬件参数以及网络通信,分析配置过程中遇到的问题并提供解决方案。 展开更多
关键词 网络安全 DVWA 入侵与防范 漏洞 WEB应用程序
下载PDF
基于支持向量机的智能矿井工控网络入侵防御方法
16
作者 李伟宏 宋坤 《通信电源技术》 2023年第10期138-140,共3页
为解决工控网络入侵防御方法存在防御响应时间较长、防御误报率较高的问题,基于支持向量机,对智能矿井工控网络入侵防御方法进行研究。对入侵数据集进行预处理,建立机器学习模型与网络入侵检测模型,基于支持向量机建立分类超平面线性方... 为解决工控网络入侵防御方法存在防御响应时间较长、防御误报率较高的问题,基于支持向量机,对智能矿井工控网络入侵防御方法进行研究。对入侵数据集进行预处理,建立机器学习模型与网络入侵检测模型,基于支持向量机建立分类超平面线性方程,实现多维度入侵防御。分析实验结果可知,在网络入侵数据量逐级增多的情况下,设计的网络入侵防御误报率始终不超过1%,防御效果优势显著。 展开更多
关键词 支持向量机 智能矿井 工控网络 入侵防御 机器学习
下载PDF
基于以太网的列车控制网络信息安全技术研究
17
作者 谭康柏 《设备监理》 2023年第5期29-33,共5页
基于以太网的列车控制网络存在非法外联、网络攻击等信息安全隐患。本文结合轨道交通信息安全技术、相关技术标准的要求,总结了以太网列车控制网络的相关特点,阐述了信息安全相关防护技术及相关要求;针对以太网列车控制网络的主要信息... 基于以太网的列车控制网络存在非法外联、网络攻击等信息安全隐患。本文结合轨道交通信息安全技术、相关技术标准的要求,总结了以太网列车控制网络的相关特点,阐述了信息安全相关防护技术及相关要求;针对以太网列车控制网络的主要信息安全风险因素,提出了边界防护、访问控制、入侵及恶意代码防范、安全审计等信息安全防护措施,并提出一套车载信息安全防护系统技术方案,解决以太网列车控制网络的信息安全问题。 展开更多
关键词 以太网列车控制网 访问控制 入侵及恶意代码防范 安全审计
下载PDF
新形势下网络安全运营服务研究
18
作者 袁广恋 云圆圆 《无线互联科技》 2023年第14期165-168,共4页
网络安全工作要求越来越高,网络安全运营者面临的网络安全问题越来越多。文章研究了如何在新形势下通过网络安全运营服务来提升网络安全运营者的网络安全防护能力,降低网络安全事件发生的概率。本研究通过资产调研、防护能力检测、防入... 网络安全工作要求越来越高,网络安全运营者面临的网络安全问题越来越多。文章研究了如何在新形势下通过网络安全运营服务来提升网络安全运营者的网络安全防护能力,降低网络安全事件发生的概率。本研究通过资产调研、防护能力检测、防入侵安全加固、安全监测与预警服务、威胁分析及应急处置,构建新的网络安全运营服务体系。 展开更多
关键词 网络安全运营服务 资产调研 防护能力检测 防入侵加固 安全态势感知
下载PDF
入侵防御系统研究 被引量:18
19
作者 吴海燕 蒋东兴 +1 位作者 程志锐 高国柱 《计算机工程与设计》 CSCD 北大核心 2007年第24期5844-5846,5866,共4页
入侵防御系统(IPS)是能够检测到任何攻击行为,包括已知和未知攻击,并能够有效地阻断攻击的硬件或者软件系统。讨论了入侵防御系统的概念和特征,分析了当前IPS的4种实现模型(在线模型、7层交换模型、7层防火墙模型和混合模型)的优缺点。... 入侵防御系统(IPS)是能够检测到任何攻击行为,包括已知和未知攻击,并能够有效地阻断攻击的硬件或者软件系统。讨论了入侵防御系统的概念和特征,分析了当前IPS的4种实现模型(在线模型、7层交换模型、7层防火墙模型和混合模型)的优缺点。为解决这些模型在同时提高网络性能和入侵检测准确度方面的难题,给出了一个基于WindFofce千兆网络数据控制卡的嵌入式入侵防御系统的实现实例。 展开更多
关键词 入侵防御系统 网络入侵防御系统 嵌入式入侵防御系统 高速网络 入侵检测系统 防火墙 网络安全
下载PDF
基于扩展贝叶斯分类算法的网络安全检测 被引量:8
20
作者 孙亚男 宁士勇 刘文俊 《计算机工程与设计》 CSCD 2004年第6期954-957,共4页
很多网关系统和入侵检测系统被设计来保护自身网络系统的安全,其中一种安全隐患是现有网关系统的不完备性和入侵检测系统的虚警和漏警。总结了前人成果,将贝叶斯算法进行了改进并与之融合,对原有的入侵检测算法提出了改进,得到了一个新... 很多网关系统和入侵检测系统被设计来保护自身网络系统的安全,其中一种安全隐患是现有网关系统的不完备性和入侵检测系统的虚警和漏警。总结了前人成果,将贝叶斯算法进行了改进并与之融合,对原有的入侵检测算法提出了改进,得到了一个新的模型。该模型提高了入侵检测系统的完备性和准确性,更有效地保障了网络系统的安全。 展开更多
关键词 贝叶斯算法 网络安全 入侵阻止 入侵检测 规则检测 网关系统
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部