intrusion detection Articles
-
Misuse-based intrusion detection using Bayesian networks
This paper presents an application of Bayesian networks to the process of intrusion detection in computer networks. The presented system, called Bayesian system for intrusion detection (Basset) extends functionality of Snort, an open-source network intrusion detection system (NIDS), by incorporating Bayesian networks as additional processing stages. The flexible nature of this solution allows it ...
-
The HoneyTank: a scalable approach to collect malicious internet traffic
In this paper, we propose an efficient method for collecting large amounts of malicious internet traffic. The key advantage of our method is that it does not need to maintain any state to emulate TCP services running on a large number of emulated end-systems. We implemented a prototype on the ASAX intrusion detection system and we provide several examples of the malicious activities that were ...
-
Model for evaluation of SOA security metrics using attack graphs
In the paper, a proposal of risk assessment for service oriented architecture (SOA) is given. The proposal is based on service availability metrics that is a probability that the service is available. Foundations for calculating this probability by simulation using attack graphs are given. The attack graph is a representation of actions that end in a state where an intruder achieved his/her ...
-
Identifying network intrusion with defensive forecasting
With tremendous growth of computing devices connected to networks, information systems security has become an issue of serious global concern. Various researches reveal that many organisations reported computer security breaches, and financial losses due to the security breach will be significant considering the fact that the financial losses on a per-incident basis are estimated 0.5% to 1% of ...
-
Perimeter Intrusion Detection for Modern Warehouses
Logistics is one of the industries that Artificial Intelligence is making an ineffaceable mark on, creating boundless opportunities for software vendors to innovate in the space. Logistics companies today need intelligent smart warehousing technologies which becomes possible by applying the right algorithms to perform tasks like smart inventory, supply chain, transit prediction and security. ...
-
DHT-based security infrastructure for trusted internet and grid computing
We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing ...
-
Network security mechanisms utilising network address translation
A new protocol technology is just starting to emerge from the laboratory environment. Its stated purpose is to provide a means whereby networks, and the services that reside on them, can be protected from adversarial compromise. This protocol called Dynamic Network Address Translation (Dynat) is designed to protect computer networks against cyber attacks. Briefly, Dynat changes network ...
-
Diminishing marginal returns for sensor networks in a water distribution system
With increasing interest in the implementation/functionality of a contaminant warning system for water distribution systems, questions exist over the application to a real distribution system. A methodology is described to assess the impacts of changes in the numbers of sensors, on the time delay required to detect a contaminant intrusion event and to maximize sensor detection redundancy as ...
-
Perimeter Security Critical Infrastructure - Case study
Frequent false alarms are always an issue,- for perimeter security end-users who need to spend time investigating each alarm-, and are very costly due to a possible delay of necessary response time and generally affecting efficiency. X-SURVEILLANCE X-SENSOR Intelligence & Evidence detects unauthorised persons using their cellular / wireless devices carrying with them. X-SURVEILLANCE X-SENSOR ...
-
Intrusion detection through SCADA systems using fuzzy logic-based state estimation methods
Supervisory Control And Data Acquisition (SCADA) systems represent a vulnerability in vital infrastructures. For example, an electric power system is subjected to intrusions via its SCADA systems; however, the instrumentation provides detectable variations in response to such interference. Presented herein is a strategy that augments state estimation methods using a Hybrid Fuzzy System for fault ...
-
TBox RTU`s Help Deliver Digital Transformation for Southwest Gas Field. - Case Study
About the Client The PetroChina Southwest Oil and Gas Field Company Chongqing Gas Mine is located in the jurisdiction of 8 natural gas production and gas transmission areas, with 277 industrial gas wells and a daily production capacity of 20 million cubic meters. Project Overview As part of a digital upgrade project, the client wanted to improve monitoring of key gas wells to include both ...
By Ovarro
-
Converged Security Solutions: The Time is Now
Up until the lockdown at least, I have been a regular attendee at the world’s leading international security exhibitions and conference. One thing is becoming more and more clear – the convergence of traditional physical security solutions and cybersecurity is vital in the modern age. End users now expect holistic solutions that address all threats – whether they be from ...
By Bandweaver
-
The Argument for Edge Video Analytics
Video analytics can provide an intelligent and automated approach to perimeter security by detecting unauthorized intrusion along any perimeter in the lowest light conditions and on complex sites. In the following article, we discuss the challenges faced by video analytics and how we overcame these challenges based on our experience and customer feedback. Historically, with analog cameras, you ...
-
Audit Trails: Uncover the Improvement Opportunities
The term “Audit Trail” is generally referred for uncovering the inconsistencies through the system. It records the activities in the sequence they are actually carried, making it easy for reviewer, approvers, and auditors to track – when, why, and what went wrong. Having an electronic system to record audit trail ensures step-by-step recording and demonstrates culture of quality ...
-
Landis sewerage authority lift station monitoring - Case Study
Landis Sewerage Authority (LSA) serves the greater Vineland, New Jersey area. LSA was facing some typical problems monitoring their 23 lift stations. “Phone line problems with our autodialers were increasing almost as fast as Ma Bell's prices,” says Sam Hess, Collection System Plant Manager for the 8.2 MGD authority. “Additionally, every Wednesday when we would test our stand-by ...
-
Elevating Security Protocols: The Role of Walk-Through Metal Detectors in Government Buildings and Offices
Elevating Security Protocols: The Role of Walk-Through Metal Detectors in Government Buildings and Offices The security of government buildings and offices is of paramount importance, ensuring the protection of personnel, sensitive information, and the overall integrity of government operations. In this era of evolving security challenges, the utilization of walk-through metal detectors has ...
-
How a new generation of building security solutions enhance value to customers
The past two years have spotlighted several drastic changes organizations must make to adapt to the pandemic and accommodate the shift in the way people now live and work. From the perspective of access control, managing occupancy and ensuring employee safety is only a starting point. Today’s businesses need security solutions that: Provide greater flexibility for users and operators ...
-
Ensuring interoperability, system integration
The digitalisation of water systems involves obtaining large amounts of data, and sometimes this information comes from different systems; for the data collected to be operational and effective, they must be integrated into a single platform that facilitates further analysis and study. At Hidroconta we have developed a data integration API in order to perform a comprehensive study of the ...
-
How FPI Processes Infrared Thermal Imaging Technology
Infrared thermal imaging is a passive, non-contact infrared technology. All objects in nature whose temperature is higher than absolute zero (-273°C) radiate infrared rays at all times, and infrared radiation carries the characteristic information of the target object. The spatial distribution of the object's surface temperature is processed by the photoelectric infrared detector to form a ...
-
Increasing Security Resilience with Value Engineered Solutions
It’s safe to say that 2020 has been an unusual year; the impact of COVID-19 has been felt around the world, with everyone adapting to what is commonly called ‘the new norm’. Individuals, families, companies, organisations and even countries are having to change the way they operate, how they interact and how they travel. The impact on businesses has been massive, home working ...
By Bandweaver
Need help finding the right suppliers? Try XPRT Sourcing. Let the XPRTs do the work for you