Loading...
Search for: intrusion-detection-system--ids
0.011 seconds

    An efficient method for identifying IDS agent nodes by discovering compromised nodes in MANET

    , Article 2009 International Conference on Computer and Electrical Engineering, ICCEE 2009, 28 December 2009 through 30 December 2009, Dubai ; Volume 1 , 2009 , Pages 625-629 ; 9780769539256 (ISBN) Kuchaki Rafsanjani, M ; Khavasi, A. A ; Movaghar, A ; Sharif University of Technology
    Abstract
    Intrusion Detection Systems (IDS) for Mobile Ad hoc NETworks (MANETs) are necessary when they are deployed in reality. In This paper, we have presented a combined method of selecting IDS agent nodes in mobile ad hoc networks. Since, the IDS agents in MANET due to more activities need to more battery power. In our method, first, compromised nodes are detected and then the nodes with the highest energy power from among valid nodes as IDS agent nodes are considered. So, with this method, some valid nodes contribute in intrusion detection activities and costs of the network monitoring will be reduced and the network lifetime will be increased. © 2009 IEEE  

    AIDSLK: an anomaly based intrusion detection system in linux kernel

    , Article Communications in Computer and Information Science ; Volume 31 , 2009 , Pages 232-243 ; 18650929 (ISSN); 9783642004049 (ISBN) Almassian, N ; Azmi, R ; Berenji, S ; Sharif University of Technology
    2009
    Abstract
    The growth of intelligent attacks has prompted the designers to envision the intrusion detection as a built-in process in operating systems. This paper investigates a novel anomaly-based intrusion detection mechanism which utilizes the manner of interactions between users and kernel processes. An adequate feature list has been prepared for distinction between normal and anomalous behavior. The method used is introducing a new component to Linux kernel as a wrapper module with necessary hook function to log initial data for preparing desired features list. SVM neural network was applied to classify and recognize input vectors. The sequence of delayed input vectors of features was appended to...