TAILIEUCHUNG - Agent based intrusion detection technique for wireless network

An intrusion detection system (IDS) generally detects unwanted manipulations of computer systems, mainly through the Internet. (IDS), as a new defensive-security layer to the WSNs' security infrastructure; which it can detects unsafe activities and unauthorized access. | ISSN:2249-5789 Namita Singh et al , International Journal of Computer Science & Communication Networks,Vol 4(3),53-57 Agent Based Intrusion Detection Technique for Wireless Network Namita Singh uday kumar singh Computer Science & Engineering Department , LUCKNOW namitasingh02@ Abstract An intrusion detection system (IDS) generally detects unwanted manipulations of computer systems, mainly through the Internet. (IDS), as a new defensive-security layer to the WSNs' security infrastructure; which it can detects unsafe activities and unauthorized access; also, when attacks occurred, even new attacks such as anomalies, it can notify by different warnings and perform some actions (mainly predefined actions). Therefore, the main purpose of this paper is discussing and solving the intrusion detection over a wireless network. 1. Introduction Intrusion, . unauthorized access or login signing in and gaining access to a network server, Web server or other computer system. The process (the noun) is a "login" or "logon," while the act of doing it (the verb) is to "log in" or to "log on. (To the system, or the network or other resources); Intrusion is a set of actions from internal or external of the network, which violate security aspects (including integrity, confidentiality, availability and authenticity) of a network's resource. Intrusion detection is a process which detecting contradictory activities with security policies to unauthorized access or performance reduction of a system or network; the purpose of intrusion detection process is reviewing, controlling, analysing and representing reports from the system and network activities. Intrusion Detection System (IDS) [1][2], .: • A hardware or software or combinational system, with aggressivedefensive approach to protect information, systems and networks; • Usable on host, network and application levels; • For analysing traffic, controlling communications and ports, detecting attacks and occurrence

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.