Search Results - (( intrusion prevention based algorithm ) OR ( panel optimization path algorithm ))
Search alternatives:
- intrusion prevention »
- panel optimization »
- optimization path »
- prevention based »
- path algorithm »
-
1
Network instrusion prevention system ( NIPS) based on network intrusion detection system (NIDS) and ID3 algorithm decision tree classifier
Published 2011“…Network security has gained significant attention in research and industrial communities.Due to the increasing threat of the network intrusion,firewalls have become important elements of the security policy.Firewall performance highly depends toward number of rules,because the large more rules the consequence makes downhill performance progressively.Firewall can be allow or deny access network packets incoming and outgoing into Local Area Network(LAN),but firewall can not detect intrusion.To distinguishing an intrusion network packet or normal is very difficult and takes a lot of time.An analyst must review all the network traffics previously.In this study,a new way to make the rules that can determine network packet is intrusion or normal automatically.These rules implemented into firewall as prevention,which if there is a network packet that match these rules then network packet will be dropped.This is called Network Intrusion Prevention System(NIPS).These rules are generated based on Network Intrusion Detection System(NIDS)and Iterative Dichotomiser 3 (ID3)Algorithm Decision Tree Classifier,which as data training is intrusion network packet and normal network packets from previous network traffics.The experiment is successful,which can generate the rules then implemented into a firewall and drop the intrusion network packet automatically.Moreover,this way can minimize number of rules in firewall.…”
Get full text
Get full text
Thesis -
2
A New Model For Network-Based Intrusion Prevention System Inspired By Apoptosis
Published 2024thesis::doctoral thesis -
3
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…This thesis presents new intrusion prevention and self-healing system (SH) for critical services network security. …”
Get full text
Get full text
Thesis -
4
Cooperative multi agents for intelligent intrusion detection and prevention systems / Shahaboddin Shamshirband
Published 2014“…Firstly, we review the state of the art of intelligent intrusion detection and prevention system (IIDPS), and highlight the security requirement of cooperative based-IIDPS. …”
Get full text
Get full text
Thesis -
5
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
Published 2018“…The main focus of the present research is the design of a model that prevents distributed denial-of-service attacks based on host-based intrusion detection protection systems over hypervisor environments. …”
Get full text
Get full text
Get full text
Book Chapter -
6
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Therefore, it is of utmost importance to prevent such intrusions. The prevention of such intrusions is entirely dependent on their detection that is a main part of any security tool such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), checkpoints and firewalls. …”
Get full text
Get full text
Thesis -
7
Feature Subset Selection in Intrusion Detection Using Soft Computing Techniques
Published 2011“…Therefore, it is of utmost importance to prevent such intrusions. The prevention of such intrusions is entirely dependent on their detection that is a main part of any security tool such as Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Adaptive Security Alliance (ASA), checkpoints and firewalls. …”
Get full text
Get full text
Thesis -
8
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
Published 2018“…The mechanism’s design is based on the hybrid Antlion Optimization Algorithm (ALO) with Multilayer Perceptron (MLP) to protect against DDoS attacks. …”
Get full text
Get full text
Thesis -
9
Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm
Published 2016“…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Network intrusion detection and alert system
Published 2024“…Signature-based detection compares network traffic packets with a real-time updated database of known attack patterns, while anomaly-based detection algorithms learn normal behavior patterns and identify deviations. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
Published 2019“…Mitigation techniques such as honeypot simulation which helps in vulnerability assessment, along with machine learning algorithms, suitable for intrusion detection and prevention of cyber-attacks in SCADA systems has been detailed.…”
Get full text
Get full text
Get full text
Article -
13
The effect of dataset imbalance on the performance of SCADA intrusion detection systems
Published 2023“…Effective and highly reliable security devices, such as intrusion detection system (IDSs) and intrusion prevention systems (IPS), are critical. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
14
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
Published 2017“…The data used in training and testing was KDD 99 data set based on the Defense Advanced Research Projects Agency (DARPA) intrusion detection programme, which is publicly accessible by Lincoln Labs. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An intelligence technique for denial of service (DoS) attack detection
Published 2018“…The data used in training and testing was KDD 99 data set based on the Defense Advanced Research Projects Agency (DARPA) intrusion detection programme, which is publicly accessible by Lincoln Labs. …”
Get full text
Get full text
Get full text
Article -
16
DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM
Published 2022“…This research has provided meaningful solutions to prevent drowsy driving accidents.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
An improved hybrid learning approach for better anomaly detection
Published 2011“…Gaining unauthorized access to files, attempting to damage the network and data, and any other serious security threat must be prevented by the Intrusion Detection System. Anomaly detection is one of intrusion detection techniques. …”
Get full text
Get full text
Thesis -
18
A real-time integrated fire detection and alarm (FDA) system for network based building automation
Published 2017“…This work proposes an improved framework for FDA system to ensure a robust, intelligent network of FDA control panels in real-time. Methods/Analysis: In this work, the shortest path algorithm was chosen for series of buildings connected by a fiber-optic network. …”
Get full text
Get full text
Get full text
Article -
19
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…There are two methods in dealing with imbalanced classification problem, which are based on data or algorithmic level. Data level based methods are meant to solve the imbalanced classification problem based on the idea of making both classes equal in number. …”
Get full text
Get full text
Get full text
Thesis -
20
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022Get full text
Get full text
Student Project
