To see the other types of publications on this topic, follow the link: Ids/ips.

Journal articles on the topic 'Ids/ips'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Ids/ips.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bharti, Shubham. "Intrusion detection and prevention systems (IDS/IPS) for OS protection." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31718.

Full text
Abstract:
As cyber threats are increasing so it becomes important to secure operating systems. Traditional methods to secure OS is inadequate against sophisticated attacks so there is the necessity of intrusion detection and prevention systems(IDS/IPS). This research will help to protect OS from various cyber threats by making OS stronger with (IDS/IPS). This study investigates operational mechanisms and integration strategies of IDS/IPS within various different OS environments. The review of literature shows the evolution of IDS/IPS technologies, from signature-based to anomaly- based systems, which pl
APA, Harvard, Vancouver, ISO, and other styles
2

Ang, Sokroeurn, Sopheaktra Huy, and Midhunchakkaravarthy Janarthanan. "Utilizing IDS and IPS to Improve Cybersecurity Monitoring Process." Journal of Cyber Security and Risk Auditing 2025, no. 3 (2025): 77–88. https://doi.org/10.63180/jcsra.thestap.2025.3.10.

Full text
Abstract:
Intrusion detection system (IDS) and intrusion prevention system (IPS) are crucial for protecting cyberattacks that target organizational information systems, IDS is focusing on detecting cyberattacks while IPS is focusing on preventing cyberattack. The research examines the limitations of IDS and IPS in detecting and preventing threats, highlighting that both systems rely on signature and anomaly-based detection methods. However, these detection techniques require significant enhancements, as current implementations in IDS and IPS may not effectively address all threats. The main objective of
APA, Harvard, Vancouver, ISO, and other styles
3

Taufik, Rahman Ilham Rozen. "Strategi Penguatan Keamanan Jaringan dengan IDS dan IPS di PT. Toppan Plasindo Lestari Cibitung." TEKNIKA 19, no. 1 (2024): 249–59. https://doi.org/10.5281/zenodo.14195077.

Full text
Abstract:
IDS (Intrusion Detection System) dan IPS (Intrusion Prevention System) merupakan teknologi keamanan jaringan yang esensial. IDS memantau lalu lintas jaringan dan aktivitas mencurigakan, IPS mengintegrasikan fungsi firewall dan IDS untuk menolak serangan yang teridentifikasi. Penelitian ini berfokus pada strategi penguatan keamanan jaringan di PT. Toppan Plasindo Lestari Cibitung melalui implementasi sistem Intrusion Detection System (IDS) dan Intrusion Prevention System (IPS). Masalah utama yang dihadapi adalah meningkatnya ancaman siber, seperti malware dan serangan DDoS, serta keterbatasan s
APA, Harvard, Vancouver, ISO, and other styles
4

Popkov, Gleb. "APPLICATION OF SIEM SOLUTIONS ON MULTI-SERVICE COMMUNICATIONS NETWORKS." Interexpo GEO-Siberia 9 (2019): 61–65. http://dx.doi.org/10.33764/2618-981x-2019-9-61-65.

Full text
Abstract:
The article discusses solutions in the field of SIEM (Security information and event management systems) and the operation of IDS / IPS class network intrusion detection / prevention systems. The general functional characteristics of these software products are presented, typical solutions for the inclusion of IDS / IPS in data transmission network are offered, at the second, third and fourth levels of the OSI model. A brief description and some practical examples of using IDS / IPS from Sourcefire, the SNORT product, are given.
APA, Harvard, Vancouver, ISO, and other styles
5

Papadaki, Maria, and Steven Furnell. "IDS or IPS: what is best?" Network Security 2004, no. 7 (2004): 15–19. http://dx.doi.org/10.1016/s1353-4858(04)00106-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dulanovic, Nenad, Dane Hinic, and Dejan Simic. "An intrusion prevention system as a proactive security mechanism in network infrastructure." Yugoslav Journal of Operations Research 18, no. 1 (2008): 109–22. http://dx.doi.org/10.2298/yjor0801109d.

Full text
Abstract:
A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS), proposed as a solution to perimeter defense, have many open problems and it is clear that better solutions must be found. Due to many unsolved problems associated with IDS, Intrusion Prevention Systems (IPS) are introduced. The main idea in IPS is to be proactive. This paper gives an insight of Cobrador Bouncer IPS implementation. System ar
APA, Harvard, Vancouver, ISO, and other styles
7

Korzachenko, Olha, and Vladyslav Poltorak. "IDS/IPS selection methodological principles for organisations." Modeling and Information Systems in Economics, no. 98 (November 28, 2019): 135–46. http://dx.doi.org/10.33111/mise.98.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Karambelkar, Mr Apoorva. "Next Generation Firewall using IPS & IDS." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2868–74. https://doi.org/10.22214/ijraset.2025.68804.

Full text
Abstract:
he increasing complexity and frequency of cyberattacks have exposed vulnerabilities in traditional firewall systems, which struggle to defend against sophisticated, multi-layered threats. As a response to this growing challenge, Next-Generation Firewalls (NGFWs) integrate Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) to offer improved network security by enabling deep packet inspection, anomaly detection, and advanced traffic control. This paper explores the integration of open-source Security Information and Event Management (SIEM) platform Wazuh with NGFWs to enhan
APA, Harvard, Vancouver, ISO, and other styles
9

Nadeykina, Victoria Sergeevna, and Maria Aleksandrovna Maslova. "Analysis of open-source intrusion detection and prevention systems for integration with Russian operating systems." Research result. Information technologies 9, no. 2 (2024): 41–48. http://dx.doi.org/10.18413/2518-1092-2024-9-2-0-5.

Full text
Abstract:
The article reviewed IDS/IPS such as Snort, Suricata, Fail2Ban and OSSEC, which have opensource code. Their mechanisms for ensuring network security, including architecture, functions, tools and implemented tasks, are analyzed. The possibility of integrating these systems with Russian operating systems is considered. In conclusion, it is emphasized that IDS/IPS are just one of the many layers of protection that must be implemented to ensure effective security. Only an integrated approach to security can be the key to protecting against modern cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
10

Gómez Castaño, Julio César, Néstor Jaime Castaño Pérez, and Luis Carlos Correa Ortiz. "Sistemas de detección y prevención de intrusos." Ciencia e Ingeniería Neogranadina 33, no. 1 (2023): 75–86. http://dx.doi.org/10.18359/rcin.6534.

Full text
Abstract:
Este trabajo presenta una propuesta de taxonomía experimental basada en código abierto para los Intrusion Detection System/Intrusion Prevention System (IDS/IPS), orientada a la industria 4.0, debido a las necesidades actuales de seguridad de la información en hogares y empresas. Con la transformación digital, el crecimiento exponencial del Internet de las Cosas (IoT, por sus siglasen inglés), las conexiones aInternet y el aumento de amenazas, aumentan los problemas de seguridad de los equipos, que pueden verse vulnerados por los ciberdelincuentes y ser utilizados como intermedio para atacar ot
APA, Harvard, Vancouver, ISO, and other styles
11

Samsumar, Lalu Delsi, Bahtiar Imran, Muhamad Masjun Efendi, Rudi Muslim, Zumratul Muahidin, and Zaenul Mutaqin. "Optimalisasi Keamanan Web Server Ubuntu dengan Teknologi IPS Berbasis Iptables." JTERA (Jurnal Teknologi Rekayasa) 9, no. 2 (2024): 69. https://doi.org/10.31544/jtera.v9.i2.2024.69-76.

Full text
Abstract:
Keamanan jaringan merupakan faktor krusial dalam melindungi data dan informasi penting dalam suatu organisasi. Salah satu metode untuk mengamankan web server adalah dengan menerapkan Intrusion Prevention System (IPS) berbasis iptables. Penelitian ini bertujuan untuk mengoptimalkan keamanan web server Ubuntu dengan menggunakan teknologi IPS berbasis iptables. Iptables berfungsi tidak hanya sebagai firewall, tetapi juga sebagai sistem deteksi dan pencegahan intrusi (IDS/IPS) yang efektif untuk melindungi server berbasis Linux. Dalam penelitian ini, Snort digunakan sebagai alat deteksi intrusi ya
APA, Harvard, Vancouver, ISO, and other styles
12

Safana, Hyder Abbas, Abdul Khuder Naser Wedad, and Abbas Kadhim Amal. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. https://doi.org/10.5281/zenodo.7931783.

Full text
Abstract:
Intrusion detection system (IDS) is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies. An intrusion prevention system (IPS) is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents. If anomaly traffic pass through the network IDS would generate  a false positive which means it only detects the malicious traffic, takes no action and generates only alerts but IPS
APA, Harvard, Vancouver, ISO, and other styles
13

Awal, Hasri. "Implementasi Intrusion Detection Prevention System Sebagai Sistem Keamanan Jaringan Komputer Kejaksaan Negeri Pariaman Menggunkan Snort Dan Iptables Berbasis Linux." Jurnal Sains Informatika Terapan 2, no. 1 (2023): 38–44. http://dx.doi.org/10.62357/jsit.v2i1.184.

Full text
Abstract:
Perkembangan jaringan komputer terus berlanjut, dalam skalabilitas, jumlah node, dan teknologi. Komputer yang terhubung ke jaringan berpotensi mengalami gangguan atau serangan. Maka dari itu keamanan jaringan sangat penting dalam sebuah sistem jaringan komputer untuk menghindari serangan dan melindungi jaringan komputer. Intrusion Detection System (IDS) dengan Snort yang diimplementasikan pada sistem operasi linux dapat melakukan pemantauan serangan DoS (Denial of Service) dan Port Scanning. Snort mode IDS akan memberi alert secara real-time sesuai dengan rules Snort yang diatur dalam local.ru
APA, Harvard, Vancouver, ISO, and other styles
14

Bognár, Eszter Katalin. "Data Mining in Cyber Threat Analysis : Neural Networks for Intrusion Detection." Academic and Applied Research in Military and Public Management Science 15, no. 2 (2016): 187–96. http://dx.doi.org/10.32565/aarms.2016.2.7.

Full text
Abstract:
The most important features and constraints of the commercial intrusion detection (IDS) and prevention (IPS) systems and the possibility of application of artificial intelligence and neural networks such as IDS or IPS were investigated. A neural network was trained using the Levenberg-Marquardt backpropagation algorithm and applied on the Knowledge Discovery and Data Mining (KDD)’99 [14] reference dataset. A very high (99.9985%) accuracy and rather low (3.006%) false alert rate was achieved, but only at the expense of high memory consumption and low computation speed. To overcome these limitat
APA, Harvard, Vancouver, ISO, and other styles
15

Widiyanto, Wahyu Wijaya. "SIMRS Network Security Simulation Using Snort IDS and IPS Methods." Indonesian of Health Information Management Journal (INOHIM) 10, no. 1 (2022): 10–17. http://dx.doi.org/10.47007/inohim.v10i1.396.

Full text
Abstract:
AbstractHospital information systems have an essential role in clinical and administrative services. This triggers an innovation that supports an integrated quality measurement data management system by integrating the Hospital Management Information System (SIMRS). SIMRS can be implemented locally or in the cloud, using the network to exchange data and information. Along with the current development of Information Technology, information security is very important, especially on a network connected to the internet. But what is unfortunate is that developments in the security system itself do
APA, Harvard, Vancouver, ISO, and other styles
16

Santoso, Joko Dwi. "Keamanan Jaringan Menggunakan IDS/IPS Strataguard sebagai Layanan Kemanan Jaringan Terpusat." SATIN - Sains dan Teknologi Informasi 3, no. 2 (2019): 56–68. http://dx.doi.org/10.33372/stn.v3i2.271.

Full text
Abstract:
Jaringan komputer terus mengalami perkembangan, baik dari skalabilitas, jumlah node dan teknologi yang digunakan. Hal ini memerlukan pengelolaan jaringan yang baik agar ketersediaan jaringan selalu tinggi. Tugas pengelolaan jaringan yang dilakukan administrator jaringan memiliki banyak permasalahan, diantaranya yang berkaitan dengan keamanan jaringan komputer. Intrusion Detection Sistem (IDS) atau Sistem Deteksi Penyusupan adalah sistem komputer (bisa merupakan kombinasi software dan hardware) yang berusaha melakukan deteksi penyusupan. IDS akan melakukan pemberitahuan saat mendeteksi sesuatu
APA, Harvard, Vancouver, ISO, and other styles
17

Seok, Jinug, Moonseok Choi, Jimyung Kim, and Jonsung Park. "A Comparative Study on Performance of Open Source IDS/IPS Snort and Suricata." Journal of the Korea Society of Digital Industry and Information Management 12, no. 1 (2016): 89–95. http://dx.doi.org/10.17662/ksdim.2016.12.1.089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Nugroho, Dyakso Anindito, Adian Fatchur Rochim, and Eko Didik Widianto. "Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro." Jurnal Teknologi dan Sistem Komputer 3, no. 2 (2015): 171. http://dx.doi.org/10.14710/jtsiskom.3.2.2015.171-178.

Full text
Abstract:
The use of information technology gives the advantage of open access for its users, but a new problem arises that there is a threat from unauthorized users. Intrusion Detection System (IDS) is applied to assist administrator to monitoring network security. IDS displays illegal access information in a raw form which is require more time to read the detected threats. This final project aims to design an IDS with web application which is made for pulling information on IDS sensor database, then processing and representing them in tables and graphs that are easy to understand. The web application
APA, Harvard, Vancouver, ISO, and other styles
19

Safana Hyder Abbas, Wedad Abdul Khuder Naser, and Amal Abbas Kadhim. "Subject review: Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)." Global Journal of Engineering and Technology Advances 14, no. 2 (2023): 155–58. http://dx.doi.org/10.30574/gjeta.2023.14.2.0031.

Full text
Abstract:
Intrusion detection system (IDS) is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies. An intrusion prevention system (IPS) is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents. If anomaly traffic pass through the network IDS would generate a false positive which means it only detects the malicious traffic, takes no action and generates only alerts but IPS detect
APA, Harvard, Vancouver, ISO, and other styles
20

Guo, Jian, Hua Guo, and Zhong Zhang. "Research on High Performance Intrusion Prevention System Based on Suricata." Highlights in Science, Engineering and Technology 7 (August 3, 2022): 238–45. http://dx.doi.org/10.54097/hset.v7i.1077.

Full text
Abstract:
Suricata is an open source, high-performance network IDS, IPS and network security monitoring engine. Based on Suricata and AF-PACKET technology, this paper research on the Suricata IPS applied to Huawei Kunpeng 920 CPU and Galaxy Kylin operating system, designs defense rules for common network threats at present, and tuning the performance of Suricata IPS in a high-traffic network environment. Using Ixia network tester, the results show that the design scheme can fully adapt to the relevant hardware system and software environment, the network throughput can reach 20Gbps.
APA, Harvard, Vancouver, ISO, and other styles
21

Korcak, Michal, Jaroslav Lamer, and Frantisek Jakab. "Intrusion Prevention/Intrusion Detection System (IPS/IDS) for Wifi Networks." International journal of Computer Networks & Communications 6, no. 4 (2014): 77–89. http://dx.doi.org/10.5121/ijcnc.2014.6407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Pantoja, Maria. "A High Granularity Approach to NetworkPacket Processing for Latency-TolerantApplications with CUDA (Corvyd)." ACI Avances en Ciencias e Ingenierías 13, no. 2 (2021): 7. http://dx.doi.org/10.18272/aci.v13i2.2142.

Full text
Abstract:
Currently, practical network packet processing used for In-trusion Detection Systems/Intrusion Prevention Systems (IDS/IPS) tendto belong to one of two disjoint categories: software-only implementa-tions running on general-purpose CPUs, or highly specialized networkhardware implementations using ASICs or FPGAs for the most commonfunctions, general-purpose CPUs for the rest. These approaches cover tryto maximize the performance and minimize the cost, but neither system,when implemented effectively, is affordable to any clients except for thoseat the well-funded enterprise level. In this paper,
APA, Harvard, Vancouver, ISO, and other styles
23

Khan, Nizam. "SDCS Agent on Veritas NetBackup Appliances Code Upgrade." International Journal of Computer Science and Mobile Computing 13, no. 3 (2024): 57–68. http://dx.doi.org/10.47760/ijcsmc.2024.v13i03.006.

Full text
Abstract:
This page has information on how to update (upgrade) Symantec Data Centre Security agent on NetBackup Appliances. • Updating SDCS agent • Merging NetBackup IPS, IDS Policies with SDCS Server Base Policies • SDCS packages installed on the Appliance. • Related articles
APA, Harvard, Vancouver, ISO, and other styles
24

Wahyudi, Farid, and Listanto Tri Utomo. "Perancangan Security Network Intrusion Prevention System Pada PDTI Universitas Islam Raden Rahmat Malang." Edumatic: Jurnal Pendidikan Informatika 5, no. 1 (2021): 60–69. http://dx.doi.org/10.29408/edumatic.v5i1.3278.

Full text
Abstract:
Security is very main in computer networks, where many devices are connected to each other to interact and exchange data without limits. Network security is also a very important issue to prioritize, one of which is to use an intrusion prevention system. At PDTI UNIRA there are often network security problems, one of which is that during the test season, the server experiences many intrusion problems. The purpose of this research is to develop a social science system based on the analysis at PDTI of Raden Rahmat Islamic University Malang. This research method uses a computer security developme
APA, Harvard, Vancouver, ISO, and other styles
25

Kurniawan, Rifky, and Fajar Prakoso. "Implementasi Metode IPS (Intrusion Prevention System) dan IDS (Intrusion Detection System) untuk Meningkatkan Keamanan Jaringan." SENTINEL 3, no. 1 (2020): 231–42. http://dx.doi.org/10.56622/sentineljournal.v3i1.20.

Full text
Abstract:
Intrusion Detection System (IDS) dapat didefinisikan sebagai kegiatan yang bersifat anomaly,incorrect, inappropriate yang terjadi di jaringan atau host. Dan IDS sendiri adalah sistemkeamanan yang bekerja bersama Firewall untuk mengatasi Intrusion. IDS mampu mendeteksipenyusup dan memberikan respon secara real time. Terdapat dua teknik yang digunakandalam IDS yaitu, NIDS (Network Based Intrusion Detection System) dan HIDS (Host BasedIntrusion Detection System). Pada percobaan kali ini IDS dibagun menggunakan perangkatlunak Snort. Snort merupakan Open Source Intrusion Detection System (IDS) yang
APA, Harvard, Vancouver, ISO, and other styles
26

Patel, Arpita D. "Vulnerability Signatures with Application Classification & Performance Enhancement for IDS/IPS." International Journal for Research in Applied Science and Engineering Technology V, no. X (2017): 385–94. http://dx.doi.org/10.22214/ijraset.2017.10056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Seshu Kumar, A. N., R. Kumar Yadav, and N. S. Raghava. "A COMPREHENSIVE OUTLINE OF DIVERSE IDS/IPS WITH RESPECT TO HYPERVISORS." Advances in Mathematics: Scientific Journal 9, no. 6 (2020): 3539–50. http://dx.doi.org/10.37418/amsj.9.6.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Gusrion, Deval, Silky Safira, Retno Devita, Ruri Hartika Zain, and Rini Sovia. "DESIGN OF PRIVATE CLOUD STORAGE USING SECURITY METHODS IDS AND IPS." Jurnal Ipteks Terapan 15, no. 4 (2021): 461–65. http://dx.doi.org/10.22216/jit.v15i4.725.

Full text
Abstract:
Cloud computing is a form of technological progress that has developed along with the times, this has spurred the increasing use of the internet. By usingtechnology internet that is able to implement server a virtual, which has the aim of building a cloud computing server at the District Communications and Information Office. Padang Pariaman uses the Operating System (OS) Proxmox VE (Virtual Environment) 6.4. Cloud computing is able to provide storage services that can be used simultaneously. The results of this study produce a cloud computing server that implements a security system with them
APA, Harvard, Vancouver, ISO, and other styles
29

Thanuja, R., and A. Umamakeswari. "Black hole detection using evolutionary algorithm for IDS/IPS in MANETs." Cluster Computing 22, S2 (2018): 3131–43. http://dx.doi.org/10.1007/s10586-018-2006-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Zafar, M. F., F. Naheed, Z. Ahmad, and M. M. Anwar. "NETWORK SECURITY: A SURVEY OF MODERN APPROACHES." Nucleus 45, no. 1-2 (2020): 11–31. https://doi.org/10.71330/nucleus.45.01-2.994.

Full text
Abstract:
Security is an essential element of information technology (IT) infrastructure and applications. Concerns about securityof networks and information systems have been growing alongwith the rapid increase in the number of network usersand the value of their transactions. The hasty security threats have driven the development of security products knownas Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) to detect and protect the network, serverand desktop infrastructure ahead of the threat. Authentication and signing techniques are used to prevent integritythreats. Users, d
APA, Harvard, Vancouver, ISO, and other styles
31

Harja, Danaswara Prawira, Andrian Rakhmatsyah, and Muhammad Arief Nugroho. "Implementasi untuk Meningkatkan Keamanan Jaringan Menggunakan Deep Packet Inspection pada Software Defined Networks." Indonesian Journal on Computing (Indo-JC) 4, no. 1 (2019): 133. http://dx.doi.org/10.21108/indojc.2019.4.1.286.

Full text
Abstract:
<p><strong>Abstract</strong></p><p>Today, Software Defined Network (SDN) has been globally recognized as a new technology for network architecture. But, there is still lack in security. Many studies use methods such as the Intrusion Prevention System (IPS) and Intrusion Detection System (IDS) to deal with social problems. But there is still a lack of security in terms of network performance. To solve the problem, can be used Deep Packet Inspection method (DPII) which make administrators can directly know what happens to traffic in real time. In this research, DPI
APA, Harvard, Vancouver, ISO, and other styles
32

Rozendaal, Kyle, Thivanka Dissanayake-Mohottalalage, and Akalanka Mailewa. "Neural Network Assisted IDS/IPS: An Overview of Implementations, Benefits, and Drawbacks." International Journal of Computer Applications 184, no. 12 (2022): 21–28. http://dx.doi.org/10.5120/ijca2022922098.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Khadafi, Shah, Yuni Dian Pratiwi, and Enggar Alfianto. "KEAMANAN FTP SERVER BERBASISKAN IDS DAN IPS MENGGUNAKAN SISTEM OPERASI LINUX UBUNTU." Network Engineering Research Operation 6, no. 1 (2021): 11. http://dx.doi.org/10.21107/nero.v6i1.190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Sangeetha, S. K. B., and Nazreen Banu A. "Intrumer: A Multi Module Distributed Explainable IDS/IPS for Securing Cloud Environment." Computers, Materials & Continua 82, no. 1 (2025): 579–607. https://doi.org/10.32604/cmc.2024.059805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Borchmann, Peter, Helen Goergen, Carsten Kobe, et al. "Early Interim PET in Patients with Advanced-Stage Hodgkin's Lymphoma Treated within the Phase 3 GHSG HD18 Study." Blood 130, Suppl_1 (2017): 737. http://dx.doi.org/10.1182/blood.v130.suppl_1.737.737.

Full text
Abstract:
Abstract Background: In our GHSG HD18 study for patients with newly diagnosed advanced-stage Hodgkin's lymphoma (HL), we used early interim positron emission tomography after 2 cycles of eBEACOPP (PET-2) to guide further treatment. In contrast to other groups, we defined a Deauville score at interim staging (iDS) ≥ 3 as positive. The prognostic impact of PET-2 in the context of eBEACOPP was and still is unclear, however. We thus investigated its association with baseline characteristics and treatment outcome in patients treated with eBEACOPP in our international phase 3 HD18 trial (NCT00515554
APA, Harvard, Vancouver, ISO, and other styles
36

Д.А., Кирин, та Сааков В.В. "МЕТОДЫ И ПРОГРАММНО-АППАРАТНЫЕ СРЕДСТВА ЗАЩИТЫ ИНФОРМАЦИИ ОТ НЕСАНКЦИОНИРОВАННОГО ДОСТУПА В СЕТИ ИНТЕРНЕТ". ИННОВАЦИОННЫЕ НАУЧНЫЕ ИССЛЕДОВАНИЯ 9-1(11) (27 вересня 2021): 31–37. https://doi.org/10.5281/zenodo.5529292.

Full text
Abstract:
В данной статье будет рассмотрена методика передачи и обработки персональных данных. Главной целью является обеспечение безопасности данных во время передачи на сервер. Для осуществления операций с информацией используется защищенное соединение. Рассмотрим методы, обеспечивающие надежную передачу на примере сетевой модели TCP/IP. В статье проводится сравнение IPS и IDS систем, для сетевой безопасности. Также, уделим внимание таким технологиям, как proxy и VPN.
APA, Harvard, Vancouver, ISO, and other styles
37

ЛЕМЕШКО, Андрій Вікторович, Ольга Миколаївна ТКАЧЕНКО, Артем Васильович АНТОНЕНКО та Микола Анатолійович ЛЯШУК. "ВПРОВАДЖЕННЯ ПРИСТРОЇВ І СИСТЕМ ДЛЯ ПІДВИЩЕННЯ ЗАХИСТУ МЕРЕЖЕВОЇ ІНФРАСТРУКТУРИ ПРИВАТНИХ ПІДПРИЄМСТВ". ITSynergy, № 2 (31 грудня 2024): 42–56. https://doi.org/10.53920/its-2024-2-3.

Full text
Abstract:
У роботі досліджено сучасні підходи до забезпечення безпеки інфокомунікаційних мереж, зокрема локальної мережі підприємства. Проведено аналіз переваг та недоліків архітектури та пристроїв, що забезпечують кібербезпеку, порівняно вплив на ефективність захисту інформаційних систем від кіберзагроз. Використано середовище Cisco Packet Tracer, для моделювання мережевої інфраструктури та оцінки ефективності інтеграції брандмауерів, систем IDS/IPS і VPN-з’єднань. Розглянуто концепції нульової довіри та сегментації мережі.
APA, Harvard, Vancouver, ISO, and other styles
38

Rakhimov, Bakhtiyorjon Nematovich, and Alevtina Aleksandrovna Muradova. "HARDWARE AND SOFTWARE PROTECTION MEANS OF PROTECTION OF CYBER ATTACKS OF INTERNET OF THINGS DEVICES." RESEARCH AND EDUCATION 3, no. 4 (2024): 11–17. https://doi.org/10.5281/zenodo.11109048.

Full text
Abstract:
<em>The article presents hardware and software protection against cyberattacks for Internet of Things devices. Methods of the Trusted Platform Module, hardware monitoring of microarchitecture and SIEM system events, architectures supporting ARM TrustZone and Intel Software Guard Extension (SGX), and a DDoS attack detection structure called BRAIN are presented. The detailed architecture of intrusion detection and prevention systems (IDS/IPS) is provided.</em>
APA, Harvard, Vancouver, ISO, and other styles
39

Spohr, Ana Maria, Gilberto Antonio Borges, and Jeffrey A. Platt. "Thickness of immediate dentin sealing materials and its effect on the fracture load of a reinforced all-ceramic crown." European Journal of Dentistry 07, no. 04 (2013): 474–83. http://dx.doi.org/10.4103/1305-7456.120682.

Full text
Abstract:
ABSTRACT Objectives: The objective of this study is to evaluate, in vitro, the thickness of immediate dentin sealing (IDS) materials on full crown preparations and its effect on the fracture load of a reinforced all-ceramic crown. Materials and Methods: Sixty premolars received full crown preparation and were divided into the following groups according to the IDS technique: G1-control; G2-Clearfil SE Bond; and G3-Clearfil SE Bond and Protect Liner F. After the impressions were taken, the preparations were temporized with acrylic resin crowns. IPS empress 2 restorations were fabricated and late
APA, Harvard, Vancouver, ISO, and other styles
40

Mohammed B. Al-Doori. "Open-Source IDS/IPS Using Statistical and Deep Learning Based Anomaly Detection in SDN." Journal of Information Systems Engineering and Management 10, no. 2s (2025): 269–84. https://doi.org/10.52783/jisem.v10i2s.288.

Full text
Abstract:
This paper explores the implementation of open-source Intrusion Detection and Prevention Systems (IDS/IPS) using statistical and deep learning-based anomaly detection techniques in Software Defined Networking (SDN) environments. It aims to address the security challenges in cloud computing by proposing a hybrid approach that combines signature-based and anomaly-based detection methods. Our results demonstrate significant improvements in detection rates and reduced false positives compared to existing systems.
APA, Harvard, Vancouver, ISO, and other styles
41

Mahendra, Daniel Desma, and Fransiska Sisilia Mukti. "Sistem Deteksi dan Pengendalian Serangan Denial of Service pada Server Berbasis Snort dan Telegram-API." Techno.Com 21, no. 3 (2022): 511–22. http://dx.doi.org/10.33633/tc.v21i3.6466.

Full text
Abstract:
Melihat pentingnya fungsi server sebagai penyedia informasi dan layanan dalam sebuah jaringan, maka penting untuk memastikan bahwa server selalu dalam keadaan aman dan dapat diakses dengan lancar. Server dituntut untuk memiliki tingkat realibilitas dan keamanan yang baik, karena banyak ancaman yang mungkin saja terjadi untuk mengganggu kinerja server, seperti adanya virus, serangan brute force, denial of service (DoS) dan sebagainya. Melakukan pemantauan secara manual terhadap kinerja server tentunya menjadi hal yang tidak memungkinkan, sehingga dibutuhkan sebuah sistem yang dapat menggantikan
APA, Harvard, Vancouver, ISO, and other styles
42

Silalahi, Lukman Medriavin, and Andhika Kurniawan. "Analisis Keamanan Jaringan Menggunakan Intrusion Prevention System (Ips) Dengan Metode Traffic Behavior." Electrician : Jurnal Rekayasa dan Teknologi Elektro 17, no. 1 (2023): 71–76. http://dx.doi.org/10.23960/elc.v17n1.2296.

Full text
Abstract:
Riset ini mengangkat masalah tentang celah keamanan jaringan untuk disusupi oleh peretas jaringan internet, diantaranya yang saat ini diteliti adalah Port Scanning, DDoS (Distribute Denial of Service), Bruteforce. Tujuan penelitian ini adalah mendeteksi setiap serangan yang terjadi dan melakukan blokir akses masuk ke server. Hipotesis riset ini adalah mendeteksi dan melakukan pencegahan terhadap serangan menggunakan default rules yang dimiliki oleh Suricata 6.0.4. Metode yang diusulkan adalah penelitian eksperimen yang bersifat kuantitatif untuk dapat mengamankan suatu sistem jaringan mengguna
APA, Harvard, Vancouver, ISO, and other styles
43

Atmadji, Ery Setiyawan Jullev, Bekti Maryuni Susanto, and Rahardian Wiratama. "Pemanfaatan IPTables Sebagai Intrusion Detection System (IDS) dan Intrusion Prevention System (IPS) Pada Linux Server." Teknika 6, no. 1 (2017): 19–23. http://dx.doi.org/10.34148/teknika.v6i1.55.

Full text
Abstract:
Keamanan jaringan menjadi hal yang penting untuk semua industri dan perusahaan untuk melindungi data dan informasi penting yang berada didalamnnya. Perlindungan keamanan dalam suatu jaringan umumnya berbasis pada keamanan transmisi data yang dibuat dan diaplikasikan untuk membantu mengamankan suatu jaringan tertentu. Untuk lebih mengoptimalkan pengambilan keputusan maka diperlukan sebuah mesin yang mampu berkolaborasi dengan database IDS maupun IPS, sehingga tipikal serangan yang sangat beragam dapat dipetakan dengan lebih optimal. Salah satu database yang mempunyai rule yang sudah ada adalah
APA, Harvard, Vancouver, ISO, and other styles
44

Balla, Asaad, Mohamed Hadi Habaebi, Elfatih A. A. Elsheikh, Md Rafiqul Islam, and F. M. Suliman. "The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems." Sensors 23, no. 2 (2023): 758. http://dx.doi.org/10.3390/s23020758.

Full text
Abstract:
Integrating IoT devices in SCADA systems has provided efficient and improved data collection and transmission technologies. This enhancement comes with significant security challenges, exposing traditionally isolated systems to the public internet. Effective and highly reliable security devices, such as intrusion detection system (IDSs) and intrusion prevention systems (IPS), are critical. Countless studies used deep learning algorithms to design an efficient IDS; however, the fundamental issue of imbalanced datasets was not fully addressed. In our research, we examined the impact of data imba
APA, Harvard, Vancouver, ISO, and other styles
45

Saito, Satomi, Koji Maruhashi, Masahiko Takenaka, and Satoru Torii. "TOPASE: Detection and Prevention of Brute Force Attacks with Disciplined IPs from IDS Logs." Journal of Information Processing 24, no. 2 (2016): 217–26. http://dx.doi.org/10.2197/ipsjjip.24.217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

van den Breemer, C., MMM Gresnigt, M. Özcan, W. Kerdijk, and MS Cune. "Prospective Randomized Clinical Trial on the Survival of Lithium Disilicate Posterior Partial Crowns Bonded Using Immediate or Delayed Dentin Sealing: Short-term Results on Tooth Sensitivity and Patient Satisfaction." Operative Dentistry 44, no. 5 (2019): E212—E222. http://dx.doi.org/10.2341/18-047-c.

Full text
Abstract:
SUMMARY This prospective randomized clinical trial evaluated tooth sensitivity and patient satisfaction after the provision of partial ceramic restorations bonded using immediate (IDS) or delayed dentin sealing (DDS) on vital molar teeth through a within-subject comparison study. Between December 2013 and May 2016, a total of 30 patients (13 women, 17 men; mean age, 54 years old) received two lithium disilicate ceramic (IPS-e.max press, Ivoclar Vivadent) partial restorations on vital first or second molar teeth (N=60). The two teeth randomly received either IDS (test group, n=30) or DDS (contr
APA, Harvard, Vancouver, ISO, and other styles
47

Годована, Мар’яна, та Леся Мичуда. "АТАКИ НА ТАБЛИЦІ МАС-АДРЕС, МЕТОДИ БОРОТЬБИ З ЦИМИ АТАКАМИ". Grail of Science, № 41 (26 липня 2024): 265–71. http://dx.doi.org/10.36074/grail-of-science.05.07.2024.041.

Full text
Abstract:
У статті досліджено важливість забезпечення безпеки на канальному рівні для інформаційно-комунікаційних систем і мереж. Розглянуто основні види атак на канальному рівні, такі як MAC-Flooding та MAC-Spoofing. Проаналізовано методи та інструменти, що використовуються для проведення цих атак, а також їх наслідки для мережевих інфраструктур. Особливу увагу приділено технічним аспектам, зокрема роботі комутаторів, що є ключовими елементами канального рівня. Проаналізовано основні методи захисту від атак на локальні мережі. Запропоновано підхід інтеграції штучного інтелекту та систем IDS і IPS для п
APA, Harvard, Vancouver, ISO, and other styles
48

Witczyńska, Katarzyna. "Network security - security methods in transnational corporations (TNC)." Logistics and Transport 45, no. 1 (2020): 55–58. http://dx.doi.org/10.26411/83-1734-2015-1-45-4-20.

Full text
Abstract:
Modern times are associated with a huge increase in the number of security breaches in transnational corporations. The conclusion is that all preventive measures should be taken to stop the growing online crime in globalizing economies. Nowadays, when the Internet is becoming more and more common and more people use its resources, security becomes a priority. The use of firewalls, IDS and IPS systems, the implementation of appropriate security rules, the awareness of network users and the continuous deepening of knowledge in this area can significantly contribute to the security of data of tra
APA, Harvard, Vancouver, ISO, and other styles
49

Da Silva, Alysson Dias, and Marcelo Ladvocat. "The Social Progress Index and the evolution of indexes: a theoretical reflection." Brazilian Journal of Business 4, no. 4 (2022): 2495–501. http://dx.doi.org/10.34140/bjbv4n4-058.

Full text
Abstract:
Ao longo da história, o homem criou índices para avaliar o progresso econômico e social das nações. Estes são úteis para, além de medir os avanços ao longo do tempo, avaliar o desempenho das sociedades de um ponto de vista sustentável e também como parâmetros de comparação entre as diversas nações e regiões. Conforme a sociedade se desenvolve, surgem novas necessidades e os indicadores vão sendo aprimorados para modelos que traduzam de maneira mais adequada, a ideia de Progresso Social Sustentável. Por muitas décadas esta ideia esteve profundamente ligada a fatores puramente econômicos, porém
APA, Harvard, Vancouver, ISO, and other styles
50

Khadafi, Shah, Budanis Dwi Meilani, and Samsul Arifin. "SISTEM KEAMANAN OPEN CLOUD COMPUTING MENGGUNAKAN IDS (INTRUSION DETECTION SYSTEM) DAN IPS (INTRUSION PREVENTION SYSTEM)." Jurnal IPTEK 21, no. 2 (2017): 67. http://dx.doi.org/10.31284/j.iptek.2017.v21i2.207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!