Academic literature on the topic 'NETWORK INTRUSION RESPONSE'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'NETWORK INTRUSION RESPONSE.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "NETWORK INTRUSION RESPONSE"
Reshmi, B. M., S. S. Manvi, and Bhagyavati. "An Agent Based Intrusion Detection Model for Mobile Ad Hoc Networks." Mobile Information Systems 2, no. 4 (2006): 169–91. http://dx.doi.org/10.1155/2006/921047.
Full textAranganathan, A., and C. D. Suriyakala. "Agent based secure intrusion detection and prevention for rushing attacks in clustering MANETs." International Journal of Engineering & Technology 7, no. 2.20 (April 18, 2018): 22. http://dx.doi.org/10.14419/ijet.v7i2.20.11736.
Full textCai, Yu. "Mobile Agent Based Network Defense System in Enterprise Network." International Journal of Handheld Computing Research 2, no. 1 (January 2011): 41–54. http://dx.doi.org/10.4018/jhcr.2011010103.
Full textRichard Maina Rimiru, Guanzheng Tan, and Cheruiyot Wilson. "Innate-Inspired Automated Intrusion Response Mechanism for a Network Intrusion Detection System." Journal of Convergence Information Technology 7, no. 9 (May 31, 2012): 194–201. http://dx.doi.org/10.4156/jcit.vol7.issue9.24.
Full textBraithwaite, Imothy. "Understanding Network Security Monitoring and Intrusion Response (NSMIR)." EDPACS 28, no. 8 (February 2001): 1–12. http://dx.doi.org/10.1201/1079/43265.28.8.20010201/30381.1.
Full textShameli-Sendi, Alireza, Julien Desfossez, Michel Dagenais, and Masoume Jabbarifar. "A Retroactive-Burst Framework for Automated Intrusion Response System." Journal of Computer Networks and Communications 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/134760.
Full textMalialis, Kleanthis, Sam Devlin, and Daniel Kudenko. "Distributed reinforcement learning for adaptive and robust network intrusion response." Connection Science 27, no. 3 (April 15, 2015): 234–52. http://dx.doi.org/10.1080/09540091.2015.1031082.
Full textJiang, Xue Song, Xiu Mei Wei, and Yu Shui Geng. "The Research of Intrusion Detection System Based on ANN on Cloud Platform." Applied Mechanics and Materials 263-266 (December 2012): 2962–65. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2962.
Full textG. Murugan, Dr. "Improve secure based multi-path routing to mitigate the intrusion endurance in heterogeneous wireless sensor networks." International Journal of Engineering & Technology 7, no. 4 (September 26, 2018): 2746. http://dx.doi.org/10.14419/ijet.v7i4.17957.
Full textAn, Xingshuo, Fuhong Lin, Shenggang Xu, Li Miao, and Chao Gong. "A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing." Security and Communication Networks 2018 (August 1, 2018): 1–9. http://dx.doi.org/10.1155/2018/1821804.
Full textDissertations / Theses on the topic "NETWORK INTRUSION RESPONSE"
Malialis, Kleanthis. "Distributed reinforcement learning for network intrusion response." Thesis, University of York, 2014. http://etheses.whiterose.ac.uk/8109/.
Full textKarunanidhi, Karthikeyan. "ARROS; distributed adaptive real-time network intrusion response." Ohio : Ohio University, 2006. http://www.ohiolink.edu/etd/view.cgi?ohiou1141074467.
Full textStanley, Fred Philip. "Intrusion detection and response for system and network attacks." [Ames, Iowa : Iowa State University], 2009.
Find full textHuang, Yi-an. "Intrusion Detection and Response Systems for Mobile Ad Hoc Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14053.
Full textCannady, James D. Jr. "An Adaptive Neural Network Approach to Intrusion Detection and Response." NSUWorks, 2000. http://nsuworks.nova.edu/gscis_etd/443.
Full textSANTOS, Glenda de Lourdes Ferreira dos. "RESPOSTAS AUTOMÁTICAS PARA MELHORIA DA SEGURANÇA EM SISTEMAS DE DETECÇÃO DE INTRUSOS." Universidade Federal do Maranhão, 2003. http://tedebc.ufma.br:8080/jspui/handle/tede/366.
Full textThe development of approaches for proving fast reactions against intruders and attackers have been one of the most important requirements in the critical defense of computer networks, since the intrusion occur quickly, demanding reactions without human intervention. These approaches should be able to, autonomously, respond to attacks and deal with several important aspects of the computer security problem in order to reduce the system administrator s workload Such approaches can offer larger reliability and effectiveness in the detection and response processes, a higher rate of security to private networks, better defense possibilities and, in addition, minimize the intruder's change of success. This research work deals with the specification of a society of intelligent agents for assessment and enhancement of intrusion response systems in computer networks. The proposal of the model of intrusion response system (IRS) be based on in several available architectures, in order to look for better solutions for the problems faced in the modelling of a system of that level. With that, was modeled a system to approach the main desirable functionalities for a system of active answers. The system, as part of the NIDIA (Network Intrusion Detection System based on Intelligent Agents) (Lima, 2001), is formed by a society of agents that are responsible for the functions of identification of the characteristic of the attack, choice of the best reaction strategy and for the execution of the response.The society is composed by agents able to determine and apply automatically corrective actions against attacks classified according to a given severity taxonomic model. In the proposed model was looked for to define response to intrusions for abuse and for anomaly to guarantee a lower robustness to the system.
O desenvolvimento de mecanismos para reações rápidas contra intrusos tem sido um dos mais importantes requisitos na defesa crítica de redes de computador, visto que estes agem rapidamente exigindo reações sem intervenção humana. Tais mecanismos devem estar habitas a, automaticamente, responder um ataque e lidar com o vários aspectos do problema de seguança de computadores, e com isso reduzir a carga de trabalho do administrador do sistema. Semelhantes características podem oferecer confiança e efetividade no processo de detecção e resposta, alta taxa de segunça a redes privadas, melhores possibilidades de defesa e, ainda, minimizar as chances do intruso. Essa dissertação trata da especificação de uma sociedade de agentes para a avaliação e aprimoramento de sistema de resposta de intrusão em redes de computadores. A proposta de um modelo de sistema de resposta de intrusao(IRS) é baseada em várias arquiteturas disponíveis na procura da melhor solução para os problemas encontrados na modelagem de um sistema deste nível. Com isso, foi modelado um sistema que contenha as principais funcionalidades desejáveis para um de respostas ativas. O sistema, que faz parte do NIDIA(Network Intrusion Detection System based on Intelligent Agents) (Lima, 2001), é formado por uma sociedade de agentes que são responsáveis pelas funções de identificação das características do ataque, escolha da melhor estratégia de reação a pela execução resposta.A sociedade é composta por agentes artificiais aptos em determinar e aplicar automaticamente ações, corretivas e preventivas, contra ataques classificados de acordo com um modelo taxonômico de severidade. No modelo proposto procurou-se definir respostas de intrusoes por abuso e por anomalia para garantir maior robustes ao sistema.
Chang, Chia-Ming, and 張家銘. "An Active Network-Based Intrusion Detection and Response System." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/97794748462972803444.
Full text國立臺灣大學
機械工程學研究所
91
The network security is getting more important because there are increasing worms and network attacks in recent years. More and more security mechanisms are introduced to protect from attack, such as firewalls and intrusion detection systems (IDS). Intrusion detection is defined as the process of monitoring and analyzing events occurs in a computer or network. Intrusion detection system monitors the computer and network traffic for intrusive and suspicious activities. The past works of IDS are mostly focused on passive models, which are aimed at detections and alerts. The passive model is not enough for current network threats. Therefore, this thesis proposes an active network programming model. Comparing to a traditional network, active network gives the nodes programmable ability. It is convenience and flexibility for service provider to develop network services. A prototype of an active network-based intrusion detection and response system (IDRS) is proposed. It adopts the active network technology. The response, service deployment and service update schemes rely on this technology. The proposed IDRS can stop attacks at the first line and respond as fast as possible to reduce the damage caused by intruders. It provides the abilities of detection, report and response. It is also flexible and scalable. The proposed prototype system adopts the novel data mining technology-support vector machine to enhance the detection function. The implementation and experiences of IDRS shows satisfactory results.
Lee, Yu-Shyang, and 李裕祥. "Response strategy for Adaptive Network Intrusion Response Framework Based on Environment Dependent Risk Analysis." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/28437941034195722026.
Full textZhang, Li-zhang, and 張立長. "Risk Model for Adaptive Network Intrusion Response Framework Based on Environment Dependent Risk Analysis." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/29223814078204030884.
Full text中原大學
資訊工程研究所
97
Abstract In efforts to defend against attacks in a networked computer environment, more attention is spent on the threat caused by attacks coming from the outside network than on threat caused by attacks originated within the inside network because, in most of the cause, the main sources of the attack are from the outside network. By detecting outside attacks and fail them, most of the security threats to a computer environment are eliminated. However, an outside attack may escape the detection of the defense mechanism and successfully compromise an inside host, launch inside attacks, and cause tremendous damages. Therefore, we need a scheme to measure the risk of inside hosts and, after defense action applied, to determine effectiveness of such defense action. Based on the fact that attacks are usually completed in a sequence or a set of steps, we proposed a risk computation model. The information considered in the model includes vulnerability of hosts, attack type and vulnerability exploited by the attacks, the amount of attack, the configuration of the network environment, and possible progression of attacks. We quantify the risk of a host according to its own characteristics as well as the properties of security alerts. The resulted risk index can be utilized to evaluate the impacts of attacks experienced, predict the future progression of attacks and provide a way to validate the effectiveness of an applied defense strategy.
Alampalayam, Sathish Kumar. "Intrusion detection and response model for mobile ad hoc networks." 2007. http://etd.louisville.edu/data/UofL0288t2007.pdf.
Full textTitle and description from thesis home page (viewed December 14, 2007). Department of Computer Engineering and Computer Science. Vita. "May 2007." Includes bibliographical references (p. 163-170).
Books on the topic "NETWORK INTRUSION RESPONSE"
Privacy, intrusion detection, and response: Technologies for protecting networks. Hershey, PA: Information Science Reference, 2012.
Find full textIntrusion detection: An introduction to Internet surveillance, correlation, traps, trace back, and response. Sparta, N.J: Intrusion.Net Books, 1998.
Find full textIntrusion Prevention and Active Response: Deploying Network and Host IPS. Syngress, 2005.
Find full textBuchanan, Ben. The Defender’s View. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0004.
Full textWayne, Jansen, and National Institute of Standards and Technology (U.S.), eds. Applying mobile agents to intrusion detection and response. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textWayne, Jansen, and National Institute of Standards and Technology (U.S.), eds. Applying mobile agents to intrusion detection and response. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.
Find full textAmoroso, Edward G. Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response. Intrusion.Net Books, 1999.
Find full textBook chapters on the topic "NETWORK INTRUSION RESPONSE"
Kim, Jinoh, Kiyoung Kim, and Jongsoo Jang. "Policy-Based Intrusion Detection and Automated Response Mechanism." In Information Networking: Wireless Communications Technologies and Network Applications, 399–408. Berlin, Heidelberg: Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45801-8_39.
Full textAssawakomenkool, Nont, Yash Patel, and Jonathan Voris. "Network Aware Defenses for Intrusion Recognition and Response (NADIR)." In Proceedings of the Future Technologies Conference (FTC) 2018, 226–39. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02683-7_17.
Full textPapadaki, Maria, Steven Furnell, Benn Lines, and Paul Reynolds. "Operational Characteristics of an Automated Intrusion Response System." In Communications and Multimedia Security. Advanced Techniques for Network and Data Protection, 65–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-45184-6_6.
Full textWang, Xinyuan, Douglas S. Reeves, S. Felix Wu, and Jim Yuill. "Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework." In IFIP Advances in Information and Communication Technology, 369–84. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/0-306-46998-7_26.
Full textKaur, Manpreet, Dale Lindskog, and Pavol Zavarsky. "Integrating Intrusion Response Functionality into the MANET Specific Dynamic Intrusion Detection Hierarchy Architecture." In Ad Hoc Networks, 69–80. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74439-1_7.
Full textDasgupta, Dipankar, and Fabio A. Gonzalez. "An Intelligent Decision Support System for Intrusion Detection and Response." In Information Assurance in Computer Networks, 1–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2001. http://dx.doi.org/10.1007/3-540-45116-1_1.
Full textYi, Ping, Yiping Zhong, and Shiyong Zhang. "Applying Mobile Agent to Intrusion Response for Ad Hoc Networks." In Lecture Notes in Computer Science, 593–600. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11428848_77.
Full textRamachandra, L. Sri, and K. Hareesh. "A Novel Design for Real-Time Intrusion Response in Latest Software-Defined Networks by Graphical Security Models." In Sustainable Communication Networks and Application, 557–68. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8677-4_45.
Full textFichera, Joe, and Steven Bolt. "Incident Response." In Network Intrusion Analysis, 33–70. Elsevier, 2013. http://dx.doi.org/10.1016/b978-1-59-749962-0.00003-1.
Full text"Network inline data modification." In Intrusion Prevention and Active Response, 133–91. Elsevier, 2005. http://dx.doi.org/10.1016/b978-193226647-4/50009-7.
Full textConference papers on the topic "NETWORK INTRUSION RESPONSE"
Klein, Gabriel, Henning Rogge, Felix Schneider, Jens Toelle, Marko Jahnke, and Stefan Karsch. "Response Initiation in Distributed Intrusion Response Systems for Tactical MANETs." In 2010 European Conference on Computer Network Defense (EC2ND). IEEE, 2010. http://dx.doi.org/10.1109/ec2nd.2010.11.
Full textSamarabandu, Jagath K. "Keynote address: Dynamic network security- intrusion detection and response." In 2016 Moratuwa Engineering Research Conference (MERCon). IEEE, 2016. http://dx.doi.org/10.1109/mercon.2016.7480104.
Full textVasilomanolakis, Emmanouil, Michael Stahn, Carlos Garcia Cordero, and Max Muhlhauser. "On probe-response attacks in Collaborative Intrusion Detection Systems." In 2016 IEEE Conference on Communications and Network Security (CNS). IEEE, 2016. http://dx.doi.org/10.1109/cns.2016.7860495.
Full textHuang, Yih, and Anup K. Ghosh. "Automating Intrusion Response via Virtualization for Realizing Uninterruptible Web Services." In 2009 Eighth IEEE International Symposium on Network Computing and Applications (NCA). IEEE, 2009. http://dx.doi.org/10.1109/nca.2009.37.
Full textVasilomanolakis, Emmanouil, Michael Stahn, Carlos Garcia Cordero, and Max Muhlhauser. "Probe-response attacks on collaborative intrusion detection systems: Effectiveness and countermeasures." In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 2015. http://dx.doi.org/10.1109/cns.2015.7346892.
Full textHidalgo-Espinoza, Sergio, Kevin Chamorro-Cupuerán, and Oscar Chang-Tortolero. "Intrusion Detection in Computer Systems by using Artificial Neural Networks with Deep Learning Approaches." In 10th International Conference on Advances in Computing and Information Technology (ACITY 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101501.
Full textHooper, Emmanuel. "An Intelligent Intrusion Detection and Response System Using Network Quarantine Channels: Firewalls and Packet Filters." In 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07). IEEE, 2007. http://dx.doi.org/10.1109/mue.2007.81.
Full textHooper, Emmanuel. "An Intelligent Intrusion Detection and Response System Using Network Quarantine Channels: Adaptive Policies and Alert Filters." In 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops. IEEE, 2006. http://dx.doi.org/10.1109/wi-iatw.2006.41.
Full textSainani, Varsha, and Mei-Ling Shyu. "A Hybrid Layered Multiagent Architecture with Low Cost and Low Response Time Communication Protocol for Network Intrusion Detection Systems." In 2009 International Conference on Advanced Information Networking and Applications. IEEE, 2009. http://dx.doi.org/10.1109/aina.2009.102.
Full textJones, C. Birk, Cedric Carter, and Zachary Thomas. "Intrusion Detection & Response using an Unsupervised Artificial Neural Network on a Single Board Computer for Building Control Resilience." In 2018 Resilience Week (RWS). IEEE, 2018. http://dx.doi.org/10.1109/rweek.2018.8473533.
Full text