Sciweavers

311 search results - page 7 / 63
» Agent Methods for Network Intrusion Detection and Response
Sort
View
124
Voted
DSN
2005
IEEE
15 years 9 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
81
Voted
ISCC
2003
IEEE
111views Communications» more  ISCC 2003»
15 years 8 months ago
FIDRAN: A Flexible Intrusion Detection and Response Framework for Active Networks
Andreas Hess, Michael Jung, Günter Schäf...
173
Voted
CIA
2008
Springer
15 years 5 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
15 years 8 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....