Sciweavers

322 search results - page 52 / 65
» A System for in-Network Anomaly Detection
Sort
View
JAIR
2010
181views more  JAIR 2010»
13 years 2 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
CLUSTER
2004
IEEE
13 years 11 months ago
Towards informatic analysis of Syslogs
The complexity and cost of isolating the root cause of system problems in large parallel computers generally scales with the size of the system. Syslog messages provide a primary ...
John Stearley
CN
2000
95views more  CN 2000»
13 years 7 months ago
The 1999 DARPA off-line intrusion detection evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government...
Richard Lippmann, Joshua W. Haines, David J. Fried...
CCGRID
2009
IEEE
14 years 2 months ago
Multi-scale Real-Time Grid Monitoring with Job Stream Mining
—The ever increasing scale and complexity of large computational systems ask for sophisticated management tools, paving the way toward Autonomic Computing. A first step toward A...
Xiangliang Zhang, Michèle Sebag, Céc...
SIGSOFT
1998
ACM
13 years 11 months ago
Formal Modeling and Analysis of the HLA Component Integration Standard
An increasingly important trend in the engineering of complex systems is the design of component integration standards. Such standards de ne rules of interaction and shared commun...
Robert Allen, David Garlan