892 resultados para Intrusion


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The intrusion detection system is one of the security defense tools for computer networks. In recent years this research has lacked in direction and focus. In this paper we present a survey on the recent progression of multiagent intrusion detection systems. We survey the existing types, techniques and architectures of Intrusion Detection Systems in the literature. Finally we outline the present research challenges and issues

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Findings: After evaluating the new system, a better result was generated in line with detection efficiency and the false alarm rate. This demonstrates the value of direct response action in an intrusion detection system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aims of this study were to analyze the histomorphology of developing permanent teeth whose primary teeth had suffered traumatic intrusion, as well as to compare the influence of immediate extraction of the intruded tooth to passive re-eruption. Nine dogs from 45 to 50 days old were submitted to the intrusion of the maxillary central and lateral primary incisors using a force applicator adapted to the teeth incisal cuspids. The right side intruded teeth were kept in their sockets and the ones on the left side were extracted 30 min later. After a postoperatory periods of 30 and 60 days, four (group 1) and five (group 2) dogs, respectively, were killed by perfusion. The histological evaluations showed that, in group 1, alterations had occurred in the odontoblastic layer and deposition of the enamel matrix had taken place in some specimens while in group 2, a portion of non-mineralized matrix was observed. We concluded that the morphological changes were because of the immediate trauma of intrusion. No differences were found between the groups where the primary tooth was immediately extracted or left to passively re-erupt.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aim: To assess orthodontic intrusion effects on periodontal tissues in dogs' pre-molars with class III furcations treated with open flap debridement (OFD) or with guided tissue regeneration (GTR) associated to bone autograft (BA).Material and Methods: Class III furcations were created in the pre-molars of seven mongrel dogs. After 75 days, teeth were randomly treated with OFD or GTR/BA. After 1 month, metallic crowns were assembled on pre-molars and connected apically to mini-implants by nickel-titanium springs. Teeth were randomly assigned to orthodontic intrusion (OFD+I and GTR/BA+I) groups or no movement (OFD and GTR/BA) groups. Dogs were sacrificed after 3 months of movement and 1 month retention.Results: All class III furcations were closed or reduced to class II or I in the intrusion groups, while 50% of the lesions in non-moved teeth remained unchanged. Intruded teeth presented higher probing depth and lower gingival marginal level than non-moved teeth (p < 0.01). Clinical attachment gain was reduced in the intrusion groups by the end of retention (p < 0.05). OFD+I presented smaller soft tissue area and larger bone tissue area than other groups (p < 0.05).Conclusion: Orthodontic intrusion with anchorage via mini-implants improved the healing of class III furcation defects after OFD in dogs. GTR/BA impaired those results.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this study was to evaluate, through histologic examination, the effect of surgical repositioning of intruded dog teeth upon the pulpal and surrounding tissues. Thirty teeth in 10 adult dogs, aged 2-3 years, were used. Fifteen teeth were intruded, surgically repositioned and fixed using orthodontics wire, composite resin, and enamel acid conditioning. All these teeth served as the experimental group. The remaining intruded teeth were not treated ( control group). The animals were sacrificed to allow observations at 7,15, and 30 post-operative days. The maxillary and mandibular archs were removed and processed for histologic exam. Based on the methodology and observed results, we concluded that: pulpal necrosis, external root resorption and ankylosis were common sequelae to severe traumatic intrusion; a careful immediate surgical repositioning of severed intruded permanent tooth with complete root formation has many advantages with few disadvantages.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Internal and external computer network attacks or security threats occur according to standards and follow a set of subsequent steps, allowing to establish profiles or patterns. This well-known behavior is the basis of signature analysis intrusion detection systems. This work presents a new attack signature model to be applied on network-based intrusion detection systems engines. The AISF (ACME! Intrusion Signature Format) model is built upon XML technology and works on intrusion signatures handling and analysis, from storage to manipulation. Using this new model, the process of storing and analyzing information about intrusion signatures for further use by an IDS become a less difficult and standardized process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this report was to describe the case of an 18-month-old boy who was referred to the pediatric clinic of the School of Dentistry of Araçatuba, São Paulo State University, Araçatuba, São Paulo, Brazil, 3 days after sustaining severe trauma that led to the complete intrusion of the primary maxillary right lateral incisor, a crown fracture of the primary maxillary right central incisor without pulp involvement, and disruption of the superior labial frenum. Four months later, spontaneous re-eruption was observed in the intruded tooth and no endodontic intervention was necessary in either traumatized teeth. Four years after the trauma, a morphological change in the germ of the permanent successor was noted. Clinical follow-up and periodic radiographies are necessary after traumatic intrusion of primary teeth to monitor possible sequelae in the permanent successors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The computers and network services became presence guaranteed in several places. These characteristics resulted in the growth of illicit events and therefore the computers and networks security has become an essential point in any computing environment. Many methodologies were created to identify these events; however, with increasing of users and services on the Internet, many difficulties are found in trying to monitor a large network environment. This paper proposes a methodology for events detection in large-scale networks. The proposal approaches the anomaly detection using the NetFlow protocol, statistical methods and monitoring the environment in a best time for the application. © 2010 Springer-Verlag Berlin Heidelberg.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Intrusion detection systems that make use of artificial intelligence techniques in order to improve effectiveness have been actively pursued in the last decade. Neural networks and Support Vector Machines have been also extensively applied to this task. However, their complexity to learn new attacks has become very expensive, making them inviable for a real time retraining. In this research, we introduce a new pattern classifier named Optimum-Path Forest (OPF) to this task, which has demonstrated to be similar to the state-of-the-art pattern recognition techniques, but extremely more efficient for training patterns. Experiments on public datasets showed that OPF classifier may be a suitable tool to detect intrusions on computer networks, as well as allow the algorithm to learn new attacks faster than the other techniques. © 2011 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Recently, considerable research work have been conducted towards finding fast and accurate pattern classifiers for training Intrusion Detection Systems (IDSs). This paper proposes using the so called Fuzzy ARTMAT classifier to detect intrusions in computer network. Our investigation shows, through simulations, how efficient such a classifier can be when used as the learning mechanism of a typical IDS. The promising evaluation results in terms of both detection accuracy and training duration indicate that the Fuzzy ARTMAP is indeed viable for this sort of application.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we propose a nature-inspired approach that can boost the Optimum-Path Forest (OPF) clustering algorithm by optimizing its parameters in a discrete lattice. The experiments in two public datasets have shown that the proposed algorithm can achieve similar parameters' values compared to the exhaustive search. Although, the proposed technique is faster than the traditional one, being interesting for intrusion detection in large scale traffic networks. © 2012 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Nowadays, organizations face the problem of keeping their information protected, available and trustworthy. In this context, machine learning techniques have also been extensively applied to this task. Since manual labeling is very expensive, several works attempt to handle intrusion detection with traditional clustering algorithms. In this paper, we introduce a new pattern recognition technique called Optimum-Path Forest (OPF) clustering to this task. Experiments on three public datasets have showed that OPF classifier may be a suitable tool to detect intrusions on computer networks, since it outperformed some state-of-the-art unsupervised techniques. © 2012 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A análise de dados termohalinos e correntes medidos em uma estação fixa no Canal de Piaçaguera (Estuário de Santos) no inverno foi feita em termos de condições cíclicas da maré (quadratura e sizígia) e quase-estacionária, com o objetivo de caracterizar a estratificação da massa de água estuarina, sua circulação e transporte de sal forçados pela modulação quinzenal da maré. Foram utilizados métodos clássicos de análise de dados observacionais horários e quase sinóticos e de simulações analíticas de perfis estacionários de salinidade e do componente longitudinal da velocidade. Durante o ciclo de maré de quadratura as velocidades de enchente (v<0) e vazante (v>0) variaram de -0.20 m/s a 0.30 m/s, associadas à pequena variação de salinidade entre a superfície e o fundo (26.4 psu a 30.7 psu). No ciclo de sizígia a velocidade aumentou de -0.40 m/s a 0.45 m/s, mas a estratificação de salinidade permaneceu praticamente a mesma. Os perfis estacionários teóricos de salinidade e de velocidade apresentaram boa concordância (Skill próximo a 1,0) quando comparados aos perfis observacionais. Durante a modulação quinzenal da maré não houve alteração na classificação do canal estuarino (tipo 2a-parcialmente misturado e fracamente estratificado), pois a taxa de aumento da energia potencial não foi suficiente para ocasionar a erosão da haloclina. Esses resultados, associados à alta estabilidade vertical (RiL >20) e ao número de Richardson estuarino (1,6), permitem as seguintes conclusões: i) o mecanismo que forçou a circulação e os processos de mistura foi principalmente o balanço da descarga fluvial com a maré, associado ao componente baroclínico da força de gradiente de pressão; ii) não houve variações nas principais características termohalinas e da circulação devido à modulação quinzenal da maré; e iii) os perfis quase estacionários de salinidade e da velocidade foram adequadamente simulados com um modelo analítico clássico.