Sciweavers

502 search results - page 28 / 101
» A novel visualization technique for network anomaly detectio...
Sort
View
LISA
2007
13 years 11 months ago
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems
We present an architecture1 designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and a...
Damiano Bolzoni, Bruno Crispo, Sandro Etalle
DIMVA
2007
13 years 10 months ago
Distributed Evasive Scan Techniques and Countermeasures
Scan detection and suppression methods are an important means for preventing the disclosure of network information to attackers. However, despite the importance of limiting the inf...
Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song
CCS
2008
ACM
13 years 11 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
TACAS
2012
Springer
288views Algorithms» more  TACAS 2012»
12 years 4 months ago
Reduction-Based Formal Analysis of BGP Instances
Today’s Internet interdomain routing protocol, the Border Gateway Protocol (BGP), is increasingly complicated and fragile due to policy misconfigurations by individual autonomou...
Anduo Wang, Carolyn L. Talcott, Alexander J. T. Gu...
ISNN
2005
Springer
14 years 2 months ago
Advanced Visualization Techniques for Self-organizing Maps with Graph-Based Methods
The Self-Organizing Map is a popular neural network model for data analysis, for which a wide variety of visualization techniques exists. We present a novel technique that takes th...
Georg Pölzlbauer, Andreas Rauber, Michael Dit...