Sciweavers

457 search results - page 7 / 92
» A Multiple Model Cost-Sensitive Approach for Intrusion Detec...
Sort
View
NOMS
2010
IEEE
222views Communications» more  NOMS 2010»
13 years 5 months ago
Bayesian decision aggregation in collaborative intrusion detection networks
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...
IJSN
2008
80views more  IJSN 2008»
13 years 6 months ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah
DEON
2008
Springer
13 years 8 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
PST
2004
13 years 8 months ago
A Declarative Approach to Stateful Intrusion Detection and Network Monitoring
In this paper we present a new approach to stateful intrusion detection. It is based on a temporal logic which has the capability to express temporary properties, which are propert...
Mathieu Couture, Béchir Ktari, Mohamed Mejr...
COMCOM
2002
189views more  COMCOM 2002»
13 years 6 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt