Powerful conveyer belt real-time online detection system based on x-ray

2009 ◽  
Author(s):  
Feng Rong ◽  
Chang-yun Miao ◽  
Wei Meng
Author(s):  
Deepak Kumar Yadav ◽  
Akhilesh Bansiya

Malicious users use different techniques such as cracking passwords, text traffic, sniffing unencrypted or light, etc. System overhead and compromise critical systems. Therefore, there must be some sort of security for the organization's private resources from the Internet and from the inside. Therefore, the intrusion detection system (IDS) could be the best solution. It complements the firewall to improve the security holes. An intrusion detection system includes a management console and sensors. The management console holds all the responsibility of functionality of IDS comprises with its initialization, packet capturing, and report generation, whereas the sensors used to monitor hosts or networks in real time. There may be different categories of Intrusion Detection System. IDS can be designed in the concept of Signature analysis as well as anomaly behavior analysis. Therefore IDS used to capture the behavior of suspected packets. These functions are in host mode and called as Host Intrusion Detection System (HIDS) and in Network mode called as Network Intrusion Detection System (NIDS). The entitled dissertation work is carried out to obtain the best analysis performance through signature based detection system. It is efficient for host as well as network system .here basically Transmission Control Packets (TCP) and User Datagram Packets (UDP) considered to analysis for finding different attacks like Probe,DoS,R2l and U2R. This system is being found functionally efficient and also provide layer wise attacks details. Here different agent modules used to perform desired isolated responsibility like Mobile Agent (MA) to activate different IDS chest at different hosts, Tenet Agent (TA) for signature rule, Analysis Agent (AA) etc. The proposed system can greatly improve efficiency from offline detection to real-time online detection. Since the proposed system derives features from packet headers. Many attacks were experimented in this system. Experiments were performed to demonstrate the excellent effectiveness and efficiency of the proposed system. The proposed system can greatly improve efficiency from offline detection to real-time online detection. Since the proposed system derives features from packet headers. The entitled system can be further enhanced to capture more type of attacks at the levels of multiple layers and also may stop attacks as well.


2004 ◽  
Author(s):  
Sylvie Chapuy ◽  
Zlatko Dimcovski ◽  
Jean-Sebastien Graulich ◽  
Nicolas Rabiller ◽  
Mimoza Ristova

2003 ◽  
Author(s):  
Sylvie Chapuy ◽  
Zlatko Dimcovski ◽  
Harald Sperl ◽  
Marc Dimcovski ◽  
Caroline Valentin ◽  
...  

1986 ◽  
Vol 47 (10) ◽  
pp. 1791-1795 ◽  
Author(s):  
M. Ribet ◽  
S. Gits-Léon ◽  
F. Lefaucheux ◽  
M.C. Robert
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document