Sciweavers

322 search results - page 43 / 65
» A System for in-Network Anomaly Detection
Sort
View
CSREASAM
2006
13 years 9 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
ANSS
2006
IEEE
14 years 1 months ago
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Ashish Garg, Vidyaraman Sankaranarayanan, Shambhu ...
WWW
2010
ACM
14 years 2 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
ATAL
2011
Springer
12 years 7 months ago
Decomposing constraint systems: equivalences and computational properties
Distributed systems can often be modeled as a collection of distributed (system) variables whose values are constrained by a set of constraints. In distributed multi-agent systems...
Wiebe van der Hoek, Cees Witteveen, Michael Wooldr...
IAT
2007
IEEE
14 years 1 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...