Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 5

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  systemy wykrywania włamań
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
PL
Bezpieczeństwo danych przesyłanych w sieciach komputerowych jest jednym z najważniejszych zadań współczesnej teleinformatyki. W artykule przedstawiono podstawowe rodzaje złośliwego oprogramowania oraz przykładowe metody ataków na systemy i sieci teleinformatyczne. Przedstawiono również wybrane narzędzia i aplikacje do zabezpieczania wymiany danych. Wyjaśniono działanie systemów wykrywania włamań oraz zaprezentowano metody przeciwdziałania atakom sieciowym z wykorzystaniem zapór ogniowych.
EN
Security of data transmitted over computer networks is one of the most important tasks of modern ICT. The article presents basic types of malicious software and hacking attacks on ICT systems. It also presents some of the tools and applications for securing data exchange. Operation of intrusion detection systems and counter-attack methods using firewalls are presented.
EN
Most current Intrusion Detection Systems (IDS) examine all data features to detect intrusion. Also existing intrusion detection approaches have some limitations, namely impossibility to process a large number of audit data for real-time operation, low detection and recognition accuracy. To overcome these limitations, we apply modular neural network models to detect and recognize attacks in computer networks. They are based on the combination of principal component analysis (PCA) neural networks and multilayer perceptrons (MLP). PCA networks are employed for important data extraction and to reduce high dimensional data vectors. We present two PCA neural networks for feature extraction: linear PCA (LPCA) and nonlinear PCA (NPCA). MLP is employed to detect and recognize attacks using feature-extracted data instead of original data. The proposed approaches are tested with the help of KDD-99 dataset. The experimental results demonstrate that the designed models are promising in terms of accuracy and computational time for real world intrusion detection.
3
Content available remote Intrusion detection systems: the fundamentals, problems and the way forward
EN
Intrusion detection systems become very important computer security mechanisms as computer break-ins are getting more common everyday. Intrusion detection system (IDS) monitors computers and networks for any set of actions that attempt to compromise the integrity, confidentiality or availability of computer resources. The goal of this paper is to discuss the fundamentals of IDS and to create awareness on why IDS should be embraced. A users study was carried out to understand the perceptions of individuals: organisations and companies on the use of IDS. Summary of problems of en/rent IDS designs and the challenges ahead are presented. We also look tit what should be the new approaches or future directions m IDS design so as to eliminate these shortcomings.
4
Content available remote A new combined strategy to intrusion detection
EN
Researchers haw used so many techniques in designing intrusion detection systems (IDS) and we still do not have an effective one. The interest in this work is to combine techniques of data mining and expert system in designing an effective anomaly-based IDS. We believe that combining methods may give better coverage, and wake the detection more effective. The Idea is to mine system audit data for consistent and useful patterns of users behaviour, and then keep these normal behaviours in profiles. We then use expert system as our detection system that recognizes anomalies, and raises an alarm. The evaluation of the intrusion detection system designed allows that detection efficiency and false alarm rate problems of IDS are greatly unproved upon.
PL
Przedstawiono uogólnioną metodykę ataków na sieci TCP/IP, w tym na sieć Internet. Zaprezentowano ewolucję zabezpieczeń w sieciach TCP/IP, uwzględniając dwie równolegle rozwijające się klasy metod: systemy ochrony informacji oraz protokoły zabezpieczeń i rozszerzenia aplikacji. Omówiono stan obecny i przyszłość ścian przeciwogniowych (firewalls) oraz systemów wykrywania intruzów. Zaprezentowano metody ochrony informacji stosowane w poszczególnych warstwach sieci TCP/IP (w tym IPv6/IPsec, TLS/SSL, rozszerzenia aplikacji).
EN
The article presents a taxonomy of attacks on TCP/IP networks, including the Internet. It describes the evolution of information security in TCP/IP networks, taking into account two parallel lines of development: information security systems and security protocols, as well as security extensions to existing protocols and applications. The current state and future of firewalls and intrusion detection systems is outlined. Security mechanisms adopted in the different layers of the TCP/IP protocol stack are also presented (including IPv6/IPsec, TLS/SSL, application extensions).
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.