Intrusion detection system
-
Part 1 book "Computer security - Principles and practice" includes content: Reader’s and instructor’s guide, overview, cryptographic tools, user authentication, access control, database and cloud security, malicious software, denial of service attacks, intrusion detection, firewalls and intrusion prevention systems, buffer overflow, software security.
436p muasambanhan10 11-04-2024 1 0 Download
-
Ebook OSSEC host-based intrusion detection guide: Part 2 includes contents: Chapter 5: system integrity check and rootkit detection, chapter 6: active response, chapter 7: using the OSSEC web user interface, appendix a: log data mining, appendix b: implementing a successful OSSEC policy, appendix c: rootkit detection using host-based IDS, Appendix D: The OSSEC VMware Guest Image.
159p longtimenosee05 31-03-2024 1 0 Download
-
Ebook Secure your network for free: Using nmap, wireshark, snort, nessus, and MRTG - Part 1 includes contents: Chapter 1: presenting thebusiness case for free solutions, chapter 2: protecting your perimeter, chapter 3: protecting network resources, chapter 4: configuring an intrusion detection system.
278p longtimenosee05 31-03-2024 0 0 Download
-
Ebook The best damn firewall book period: Part 1 includes content: Introduction to information security; firewall concepts; DMZ concepts, layout, and conceptual design; introduction to intrusion detection systems; implementing a firewall with ipchains and iptables; maintaining open source firewalls; configuring solaris as a secure router and firewall; introduction to PIX firewalls; passing traffic; advanced PIX configurations;…
649p longtimenosee03 22-02-2024 4 2 Download
-
This approach can be problematic because SDN networks have different characteristics than traditional computer systems. In this paper, we propose a new method for SDN intrusion detection using machine learning. Our method addresses the problem of data imbalance, which is a common problem with machine learning datasets.
14p vigojek 02-02-2024 3 1 Download
-
Part 2 book "Twin-control - A digital twin approach to improve machine tools lifecycle" includes content: Non-intrusive load monitoring on component level of a machine tool using a kalman filter based disaggregation approach; utilizing PLC data for workpiece flaw detection in machine tools; simulation of machining operations based on the VMT concept; cyber physical system to improve machining process performance; fleet wide proactive maintenance of machine tools; visualization of simulated and measured process data from theory to practice... and other contents.
298p muasambanhan06 01-02-2024 2 2 Download
-
Ebook How to cheat at managing information security: Part 2 includes contents: Chapter 7 infrastructure security; chapter 8 firewalls; chapter 9 intrusion detection systems: theory; chapter 10 intrusion detection systems: in practice; chapter 11 intrusion prevention and protection; chapter 12 network penetration testing; chapter 13 application security flaws and application testing.
204p haojiubujain010 14-12-2023 4 2 Download
-
Welcome to the CCSP™: Cisco® Certified Security Professional Certification All-in-One Exam Guide. This book is here to help you prepare to take–and pass–the following Cisco security certification exams. Even more importantly, it is here to share a pool of knowledge that should help you become more employable in the field. If you strive for knowledge and experience, the certification will come.
520p haojiubujain09 30-11-2023 5 4 Download
-
How does one begin to protect their network against such a determined enemy who can sneak in past the firewall by using traffic that, by all accounts, looks to be perfectly acceptable according to the firewall? By using a Cisco Intrusion Detection Sensor, that’s how.The Cisco IDS looks at traffic more deeply than the firewall and operates proactively by blocking or changing access-lists on the PIX firewall or Cisco routers on the fly. In order for the Cisco IDS sensor to do its job, the IDS sensor and management software must be installed and configured properly.
673p haojiubujain09 30-11-2023 13 4 Download
-
This paper develops a new method based on hedge algebra, which is an approach that has never been implemented on an IDS system. We use the PSO swarm optimization algorithm to optimize the parameters in the proposed model.
9p vispacex 16-11-2023 3 2 Download
-
The rest of this paper is organized as follows. Section II presents the proposed model the data pre-processing and model architecture. In Section III, we describe our experimental setup, the utilized performance metrics, our experimental results, and the comparison of our work with the change of the proposed protocol hyperparameters. Finally, in Section IV, we present our conclusion and future work.
7p vispacex 16-11-2023 4 2 Download
-
Continued part 1, part 2 of ebook "The InfoSec handbook: An introduction to Information security" provides readers with contents including: network security; understanding networks and network security; intrusion detection and prevention systems; virtual private networks; physical security; physical security and biometrics; current trends in information security;...
193p tieulangtran 28-09-2023 2 2 Download
-
COntinued part 1, part 2 of ebook "Machine learning for cyber physical systems: Selected papers from the International Conference ML4CPS 2020" provides readers with contents including: prediction of batch processes runtime applying dynamic time warping and survival analysis; proposal for requirements on industrial AI solutions; information modeling and knowledge extraction for machine learning applications in industrial production systems; explanation framework for intrusion detection;...
74p tieulangtran 28-09-2023 5 2 Download
-
Ebook Red hat Linux networking and system administration: Part 2 includes contents: Chapter 16: using the red hat network, chapter 17: upgrading and customizing the Kernel, chapter 18: configuring the system on the command line, chapter 19: using scripts to automate tasks, chapter 20: performance monitoring, chapter 21: administering users and groups, chapter 22: backing up and restoring the file system, chapter 23: installing and upgrading software packages, chapter 24: security basics, chapter 25: implementing local security, chapter 26: firewalls and internet security, chapter 27: detect...
458p haojiubujain06 05-09-2023 4 2 Download
-
Ensuring secure transmission and good quality of service (QoS) are key commercial concerns in ad hoc wireless networks as their application in short range devices, sensor networks, control systems, and other areas continues to develop. Focusing on practical potential solutions, this text covers security and quality of service in ad hoc wireless networks.
196p haojiubujain06 05-09-2023 6 2 Download
-
Ebook "Security concepts" includes contents: Metadata, security properties, security models, security concepts, economics of security, adversary modeling, threat modeling, physical security, hardware security, distributed systems, identification and authentication, authorization - access control, secure system administration, logging, reporting, abuse detection, abuse response, forensics, privacy, intrusion response, network security, email security, web security, software security, human factors and usability, attack patterns, trust and personnel security, cryptography, randomness and unpr...
246p haojiubujain06 05-09-2023 3 2 Download
-
Ebook Security in distributed, grid, mobile, and pervasive computing: Part 1 includes contents: Chapter 1 security for content distribution networks — concepts, systems and research issues; chapter 2 key management and agreement in distributed systems; chapter 3 securing design patterns for distributed systems; chapter 4 pragmatic security for constrained wireless networks; chapter 5 authentication in wireless networks; chapter 6 intrusion detection in wireless sensor networks; chapter 7 false data detection and secure data aggregation in wireless sensor networks; chapter 8 privacy and anon...
217p haojiubujain06 05-09-2023 3 2 Download
-
Ebook A guide to computer network security part 2 includes contents: Chapter 8 disaster management; chapter 9 access control and authorization; chapter 10 authentication; chapter 11 cryptography; chapter 12 firewalls; chapter 13 system intrusion detection and prevention; chapter 14 computer and network forensics; chapter 15 virus and content filtering; chapter 16 standardization and security criteria: security evaluation of computer products;…
296p haojiubujain06 05-09-2023 4 2 Download
-
Ebook Computer network security part 2 includes contents: Chapter 11 firewalls; chapter 12 system intrusion detection and prevention; chapter 13 computer and network forensics; chapter 14 virus and content filtering; chapter 15 security evaluations of computer products; chapter 16 computer network security protocols and standards; chapter 17 security in wireless networks and devices; chapter 18 other efforts to secure information and computer networks; chapter 19 looking ahead security beyond computer networks; chapter 20 projects.
244p haojiubujain06 05-09-2023 4 2 Download
-
Ebook Security in wireless mesh networks: Part 1 includes contents: Chapter 1 an introduction to wireless mesh networks; chapter 2 mesh networking in wireless PANs, LANs,MANs, and WANs; chapter 3 attacks and security mechanisms; chapter 4 intrusion detection in wireless mesh networks; chapter 5 secure routing in wireless mesh networks; chapter 6 hop integrity in wireless mesh networks; chapter 7 privacy preservation in wireless mesh networks; chapter 8 providing authentication, trust, and privacy in wireless mesh networks; chapter 9 non-interactive key establishment in wireless mesh network...
357p haojiubujain06 06-09-2023 5 4 Download