Sciweavers

322 search results - page 34 / 65
» A System for in-Network Anomaly Detection
Sort
View
CIA
2007
Springer
14 years 1 months ago
High-Performance Agent System for Intrusion Detection in Backbone Networks
Abstract. This paper presents a design of high-performance agentbased intrusion detection system designed for deployment on high-speed network links. To match the speed requirement...
Martin Rehák, Michal Pechoucek, Pavel Celed...
EDBT
2004
ACM
94views Database» more  EDBT 2004»
14 years 7 months ago
Mining Extremely Skewed Trading Anomalies
Trading surveillance systems screen and detect anomalous trades of equity, bonds, mortgage certificates among others. This is to satisfy federal trading regulations as well as to p...
Wei Fan, Philip S. Yu, Haixun Wang
IM
2007
13 years 9 months ago
Real-time Analysis of Flow Data for Network Attack Detection
— With the wide deployment of flow monitoring in IP networks, the analysis of the exported flow data has become an important research area. It has been shown that flow data ca...
Gerhard Münz, Georg Carle
CCGRID
2006
IEEE
14 years 1 months ago
INTCTD: A Peer-to-Peer Approach for Intrusion Detection
In this paper we propose a peer-to-peer (P2P) prototype (INTCTD) for intrusion detection over an overlay network. INTCTD is a distributed system based on neural networks for detec...
Catalin Dumitrescu
VIZSEC
2005
Springer
14 years 1 months ago
IDGraphs: Intrusion Detection and Analysis Using Histographs
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...