Intrusion Detection Articles

  • Best practices in sensitive sites 24/7 surveillance using optronic solutions

    Military camps, nuclear & chemical plants, and public facilities such as airports are considered to be sensitive sites, as they involve massive flows of people and dangerous materials’ handling. These sensitive sites must be closely monitored even more in a context of terrorist world threat. Bertin Instruments’ optronics solutions, PeriSight® and FusionSight®, can be ...


    By Bertin Instruments SAS

  • Landis sewerage authority lift station monitoring case study

    Landis Sewerage Authority (LSA) serves the greater Vineland, New Jersey area. LSA was facing some typical problems monitoring their 23 lift stations. “Phone line problems with our autodialers were increasing almost as fast as Ma Bell's prices,” says Sam Hess, Collection System Plant Manager for the 8.2 MGD authority. “Additionally, every Wednesday when we would test our stand-by ...


    By Mission Communications, LLC

  • Diminishing marginal returns for sensor networks in a water distribution system

    With increasing interest in the implementation/functionality of a contaminant warning system for water distribution systems, questions exist over the application to a real distribution system. A methodology is described to assess the impacts of changes in the numbers of sensors, on the time delay required to detect a contaminant intrusion event and to maximize sensor detection redundancy as ...


    By IWA Publishing

  • Identifying network intrusion with defensive forecasting

    With tremendous growth of computing devices connected to networks, information systems security has become an issue of serious global concern. Various researches reveal that many organisations reported computer security breaches, and financial losses due to the security breach will be significant considering the fact that the financial losses on a per-incident basis are estimated 0.5% to 1% of ...


    By Inderscience Publishers

  • Innovative, Non-Intrusive Passive Soil Gas Collection Device Maps Large Carbon Tetrachloride Plume at the DOE Hanford Site, Washington -- 10501

    Abstract Approximately 100 hectares (250 acres) were investigated as part of the passive soil gas (PSG) investigation that included multiple areas of concern. The objective of the investigation program was to rapidly identify potential source areas and guide future sampling events based on the frequency and magnitude of compounds identified in the survey. PSG sampling was the preferred ...

  • Model for evaluation of SOA security metrics using attack graphs

    In the paper, a proposal of risk assessment for service oriented architecture (SOA) is given. The proposal is based on service availability metrics that is a probability that the service is available. Foundations for calculating this probability by simulation using attack graphs are given. The attack graph is a representation of actions that end in a state where an intruder achieved his/her ...


    By Inderscience Publishers

  • Misuse-based intrusion detection using Bayesian networks

    This paper presents an application of Bayesian networks to the process of intrusion detection in computer networks. The presented system, called Bayesian system for intrusion detection (Basset) extends functionality of Snort, an open-source network intrusion detection system (NIDS), by incorporating Bayesian networks as additional processing stages. The flexible nature of this solution allows it ...


    By Inderscience Publishers

  • A meta-level true random number generator

    True random number generators (TRNGs) are extensively used in cryptography, simulations and statistics. In this work, we introduce, extend and analyse the concept of the randomised bit cell (RBC), introducing a second meta-level of randomisation, being able to simultaneously produce random numbers and detect active non-intrusive attacks. The concept is extended by using a corrector. ...


    By Inderscience Publishers

  • The HoneyTank: a scalable approach to collect malicious internet traffic

    In this paper, we propose an efficient method for collecting large amounts of malicious internet traffic. The key advantage of our method is that it does not need to maintain any state to emulate TCP services running on a large number of emulated end-systems. We implemented a prototype on the ASAX intrusion detection system and we provide several examples of the malicious activities that were ...


    By Inderscience Publishers

  • Intrusion detection through SCADA systems using fuzzy logic-based state estimation methods

    Supervisory Control And Data Acquisition (SCADA) systems represent a vulnerability in vital infrastructures. For example, an electric power system is subjected to intrusions via its SCADA systems; however, the instrumentation provides detectable variations in response to such interference. Presented herein is a strategy that augments state estimation methods using a Hybrid Fuzzy System for fault ...


    By Inderscience Publishers

  • DHT-based security infrastructure for trusted internet and grid computing

    We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing ...


    By Inderscience Publishers

  • Development and Deployment of a Real-Time Remote Continuous Monitoring System for Manholes

    A new system for the detection of septic sewer overflows (SSOs) and unauthorized intrusions of manholes has been developed jointly with public water agencies in San Diego County, California. The goal of the project is to provide detection of SSOs early enough to deploy personnel to provide preventative action. The system has been in operation since May of 2005 and has detected and, with field ...

  • Network security mechanisms utilising network address translation

    A new protocol technology is just starting to emerge from the laboratory environment. Its stated purpose is to provide a means whereby networks, and the services that reside on them, can be protected from adversarial compromise. This protocol called Dynamic Network Address Translation (Dynat) is designed to protect computer networks against cyber attacks. Briefly, Dynat changes network ...


    By Inderscience Publishers

Need help finding the right suppliers? Try XPRT Sourcing. Let the XPRTs do the work for you