Sciweavers

311 search results - page 6 / 63
» Agent Methods for Network Intrusion Detection and Response
Sort
View
COMCOM
2002
143views more  COMCOM 2002»
13 years 7 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt
ACSAC
2005
IEEE
14 years 1 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
ICML
2002
IEEE
14 years 8 months ago
Learning to Share Distributed Probabilistic Beliefs
In this paper, we present a general machine learning approach to the problem of deciding when to share probabilistic beliefs between agents for distributed monitoring. Our approac...
Christopher Leckie, Kotagiri Ramamohanarao
ECBS
2006
IEEE
119views Hardware» more  ECBS 2006»
13 years 9 months ago
A Hybrid Intrusion Detection and Visualization System
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large pro...
Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit
ATAL
2009
Springer
14 years 4 days ago
Dynamic information source selection for intrusion detection systems
Our work presents a mechanism designed for the selection of the optimal information provider in a multi-agent, heterogeneous and unsupervised monitoring system. The selfadaptation...
Martin Rehák, Eugen Staab, Michal Pechoucek...