Sciweavers

257 search results - page 17 / 52
» A New Model for Dynamic Intrusion Detection
Sort
View
ACSAC
2002
IEEE
14 years 18 days ago
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks
The threat to organisations from network attacks is very real. Current countermeasures to denial of service (DoS) attacks rely on the perimeter model of network security. However,...
John Haggerty, Qi Shi, Madjid Merabti
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
14 years 8 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
IEEEPACT
2007
IEEE
14 years 1 months ago
JudoSTM: A Dynamic Binary-Rewriting Approach to Software Transactional Memory
With the advent of chip-multiprocessors, we are faced with the challenge of parallelizing performance-critical software. Transactional memory (TM) has emerged as a promising progr...
Marek Olszewski, Jeremy Cutler, J. Gregory Steffan
MMSP
2008
IEEE
184views Multimedia» more  MMSP 2008»
14 years 2 months ago
When multimedia advertising meets the new Internet era
—The advent of media-sharing sites, especially along with the so called Web 2.0 wave, has led to the unprecedented Internet delivery of community-contributed media contents such ...
Xian-Sheng Hua, Tao Mei, Shipeng Li
AI
2008
Springer
14 years 2 months ago
Using Unsupervised Learning for Network Alert Correlation
Alert correlation systems are post-processing modules that enable intrusion analysts to find important alerts and filter false positives efficiently from the output of Intrusion...
Reuben Smith, Nathalie Japkowicz, Maxwell Dondo, P...