134
click to vote
RAID
15 years 7 months ago
2004 Springer
This paper provides an examination of an emerging class of security mechanisms often referred to as deception technologies or honeypots. It is based on our experience over the last...
125
click to vote
RAID
15 years 7 months ago
2004 Springer
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
121
click to vote
RAID
15 years 7 months ago
2004 Springer
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
118
click to vote
RAID
15 years 7 months ago
2004 Springer
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
118
click to vote
RAID
15 years 7 months ago
2004 Springer
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
|