Sciweavers

311 search results - page 39 / 63
» Agent Methods for Network Intrusion Detection and Response
Sort
View
WSC
2007
13 years 10 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
DISCEX
2003
IEEE
14 years 28 days ago
Detecting Spoofed Packets
Packets sent using the IP protocol include the IP address of the sending host. The recipient directs replies to the sender using this source address. However, the correctness of t...
Steven J. Templeton, Karl E. Levitt
KES
2006
Springer
13 years 7 months ago
Automatic Detection of SLS Violation Using Knowledge Based Systems
Self-Management of multiservice network domains must include automatic detection of service quality violations in order to perform appropriate and timely responses, fostering the f...
Pedro Alípio, José Neves, Paulo Carv...
IAT
2008
IEEE
14 years 2 months ago
Link-Based Anomaly Detection in Communication Networks
Communication networks, such as networks formed by phone calls and email communications, can be modeled as dynamic graphs with vertices representing agents and edges representing ...
Xiaomeng Wan, Evangelos E. Milios, Nauzer Kalyaniw...
FPL
2005
Springer
119views Hardware» more  FPL 2005»
14 years 1 months ago
Real-Time Feature Extraction for High Speed Networks
With the onset of Gigabit networks, current generation networking components will soon be insufficient for numerous reasons: most notably because existing methods cannot support h...
David Nguyen, Gokhan Memik, Seda Ogrenci Memik, Al...