Sciweavers

323 search results - page 30 / 65
» Alert Detection in System Logs
Sort
View
IEEEIAS
2008
IEEE
14 years 2 months ago
Operator-Centric and Adaptive Intrusion Detection
: An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It...
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Er...
USS
2008
13 years 10 months ago
Highly Predictive Blacklisting
The notion of blacklisting communication sources has been a well-established defensive measure since the origins of the Internet community. In particular, the practice of compilin...
Jian Zhang, Phillip A. Porras, Johannes Ullrich
NOMS
2010
IEEE
154views Communications» more  NOMS 2010»
13 years 6 months ago
Extending a knowledge-based network to support temporal event reasoning
—While the polling or request/response paradigm adopted by many network and systems management approaches form the backbone of modern monitoring and management systems, the most ...
John Keeney, Clay Stevens, Declan O'Sullivan
HICSS
2006
IEEE
129views Biometrics» more  HICSS 2006»
14 years 2 months ago
Experiences with Honeypot Systems: Development, Deployment, and Analysis
Abstract— This paper presents a summary of university research performed on honeypot techniques and summarizes the results Honeypots are computing resources that serve no other p...
Robert McGrew 0002, Rayford B. Vaughn
OTM
2007
Springer
14 years 2 months ago
Toward Sound-Assisted Intrusion Detection Systems
Network intrusion detection has been generally dealt with using sophisticated software and statistical analysis, although sometimes it has to be done by administrators, either by d...
Lei Qi, Miguel Vargas Martin, Bill Kapralos, Mark ...