Sciweavers

553 search results - page 74 / 111
» A High-Performance Network Intrusion Detection System
Sort
View
CEEMAS
2007
Springer
14 years 2 months ago
Agent-Based Network Protection Against Malicious Code
This paper presents an agent-based approach to Network Intrusion Prevention on corporate networks, emphasizing the protection from fast-spreading mobile malicious code outbreaks (e...
Martin Rehák, Michal Pechoucek, Jan Tozicka...
ICCCN
2007
IEEE
14 years 2 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
AI
2008
Springer
14 years 2 months ago
Using Unsupervised Learning for Network Alert Correlation
Alert correlation systems are post-processing modules that enable intrusion analysts to find important alerts and filter false positives efficiently from the output of Intrusion...
Reuben Smith, Nathalie Japkowicz, Maxwell Dondo, P...

Lecture Notes
404views
15 years 6 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain
INFOCOM
2006
IEEE
14 years 2 months ago
Contribution of Anomalies Detection and Analysis on Traffic Engineering
—In this paper we present a methodology for detecting traffic anomalies. To accomplish that, and as a demarcation from similar works, we combine multi-scale and multi-criteria an...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...