Sciweavers

162 search results - page 10 / 33
» A NetFlow based internet-worm detecting system in large netw...
Sort
View
SASO
2010
IEEE
13 years 5 months ago
Extracting Overlay Invariants of Distributed Systems for Autonomic System Management
Many large-scale distributed systems have been built with great complexity to run Internet services. Due to the heterogeneity and dynamics of complex systems, it is very difficult ...
Hanhuai Shan, Guofei Jiang, Kenji Yoshihira
JSAC
2006
163views more  JSAC 2006»
13 years 7 months ago
Fast and Scalable Pattern Matching for Network Intrusion Detection Systems
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packets....
Sarang Dharmapurikar, John W. Lockwood
ISICA
2009
Springer
14 years 2 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
RAID
1999
Springer
13 years 11 months ago
Improving Intrusion Detection Performance using Keyword Selection and Neural Networks
The most common computer intrusion detection systems detect signatures of known attacks by searching for attack-specific keywords in network traffic. Many of these systems suffer ...
Richard Lippmann, Robert K. Cunningham
HICSS
2008
IEEE
98views Biometrics» more  HICSS 2008»
14 years 1 months ago
Improvements in Security Alert Analysis with a Truth Maintenance System
A high percentage of false positives remains a problem in current network security detection systems. With the growing reliance of industry on computer networks, and the growing v...
Albert Tang, Pradeep Ray, Lundy Lewis