intrusion detection

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 86988 Experts worldwide ranked by ideXlab platform

Henry L. Owen - One of the best experts on this subject based on the ideXlab platform.

  • IAW - Wireless intrusion detection and response
    IEEE Systems Man and Cybernetics SocietyInformation Assurance Workshop 2003., 2003
    Co-Authors: J. Levine, Henry L. Owen
    Abstract:

    A prototype implementation of a wireless intrusion detection and active response system is described. An off the shelf wireless access point was modified by downloading a new Linux operating system with nonstandard wireless access point functionality in order to implement a wireless intrusion detection system that has the ability to actively respond to identified threats. An overview of the characteristics and functionality required in a wireless intrusion detection system is presented along with a review and comparison of existing wireless intrusion detection systems and functionalities. Implemented functionality and capabilities of our prototyped system are presented along with conclusions as to what is necessary to implement a more desirable and capable wireless intrusion detection system.

  • wireless intrusion detection and response
    Systems Man and Cybernetics, 2003
    Co-Authors: Y X Lim, J. Levine, T S Yer, Henry L. Owen
    Abstract:

    A prototype implementation of a wireless intrusion detection and active response system is described. An off the shelf wireless access point was modified by downloading a new Linux operating system with nonstandard wireless access point functionality in order to implement a wireless intrusion detection system that has the ability to actively respond to identified threats. An overview of the characteristics and functionality required in a wireless intrusion detection system is presented along with a review and comparison of existing wireless intrusion detection systems and functionalities. Implemented functionality and capabilities of our prototyped system are presented along with conclusions as to what is necessary to implement a more desirable and capable wireless intrusion detection system.

Shi Yu-hao - One of the best experts on this subject based on the ideXlab platform.

  • The Application of Neural Networks In intrusion detection
    Computers & Security, 2012
    Co-Authors: Shi Yu-hao
    Abstract:

    The artificial neural network has the capability yourself-organization,self-learning and generalization.Application of neural network in intrusion detection System will become the focus of network security research at present.This intrusion detection method which based on neural network can not only identify the known attack,but also can detect the new attack and abnormal event.This article introduced the concept of intrusion detection and intrusion detection system of classification,problems in the analysis of intrusion detection techniques.At the same time,the article Proposed improved BP algorithm of neural network model for intrusion detection,finally using MATLAB validation algorithms to improve effectiveness.

Zhan D - One of the best experts on this subject based on the ideXlab platform.

  • Research the Experiment of Network intrusion detection
    Computers & Security, 2009
    Co-Authors: Zhan D
    Abstract:

    The complexity of computer network systems and the wide variety of network data make the network intrusion detection extremely difficult.The article is basic on the deep study of Data Mining, Grid Technology and intrusion detection. It uses the structure model of intrusion detection which is basic on Date Mining to improve the correctness of intrusion detection,and then improve the treatment efficiency of intrusion detection by integration of Grid Technology.

Y X Lim - One of the best experts on this subject based on the ideXlab platform.

  • wireless intrusion detection and response
    Systems Man and Cybernetics, 2003
    Co-Authors: Y X Lim, J. Levine, T S Yer, Henry L. Owen
    Abstract:

    A prototype implementation of a wireless intrusion detection and active response system is described. An off the shelf wireless access point was modified by downloading a new Linux operating system with nonstandard wireless access point functionality in order to implement a wireless intrusion detection system that has the ability to actively respond to identified threats. An overview of the characteristics and functionality required in a wireless intrusion detection system is presented along with a review and comparison of existing wireless intrusion detection systems and functionalities. Implemented functionality and capabilities of our prototyped system are presented along with conclusions as to what is necessary to implement a more desirable and capable wireless intrusion detection system.

Hu Hua - One of the best experts on this subject based on the ideXlab platform.

  • The Analysis and Atudy of intrusion detection Technology
    Computers & Security, 2009
    Co-Authors: Hu Hua
    Abstract:

    intrusion detection is one of core technologies in dynamic safe technique and it has become a research hotspot in network security in recent years. This paper first introduces the concept of intrusion detection and systematically classifies intrusion detection technology according to different standards, expounds and compares the various intrusion detection methods in detail. Then based on the analysis of these technologies,we designs an intrusion detection system architecture based on expert system. Finally,the main problems with the present intrusion detection technology are discussed,and its future trends are predicted.