Abstract. The aim of this work is to provide set of selected tests on IDS model that would enlarge the functionality of intrusion detection systems. Designed model is using several IDS, which allows it to investigate larger bandwidth and capture more attacks. This system consists of central master node and devices on which the intrusion detection systems are.The tests were designed with the attribute of repeatability and universality. They are divided into five categories which explore specific attributes of intrusion detection system.
Intrusion detection is enormously developing field of informatics. This paper provides a survey of actual trends in intrusion detection in academic research. It presents a review about the evolution of intrusion detection systems with usage of general purpose computing on graphics processing units (GPGPU). There are many detection techniques but only some of them bring advantages of parallel computing implementation to graphical processors (GPU). The most common technique transformed into GPU is the technique of pattern matching. There is a number of intrusion detection tools using GPU tested in real network traffic.
Besides cryptography, the great attention is paid to the steganography, which is considered not only the science but also the art of the concealed communication. In steganography, the information is hidden within another piece of information, called stegomedia. This paper presents a new data hiding technique based on steganographic algorithms that is hiding information into vector images. The paper briefly introduces this technique and evaluates the benefits and drawbacks of the proposed approach.
The goal of this article is to analyse, design, implement and test different ways of evaluating and visualizing logs from intrusion detection system (IDS). For the main objective of this work it was necessary to study the ways in which it will be possible to carry out data visualization recorded in the IDS database. It was necessary to design and implement evaluation, imaging and visualization logs of intrusions recorded in a computer network security system. The work will therefore bring more comfortable option to read large amounts of technical messages to humans. Such a person does not have to have knowledge of the system, which used to display visualized data in depththe person should just be able to interpret the visualization displayed on a computer screen.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.