Sciweavers

323 search results - page 6 / 65
» Alert Detection in System Logs
Sort
View
RAID
2004
Springer
14 years 21 days ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...
IUI
2005
ACM
14 years 28 days ago
Emotive alert: HMM-based emotion detection in voicemail messages
Voicemail has become an integral part of our personal and professional communication. The number of messages that accumulate in our voice mailboxes necessitate new ways of priorit...
Zeynep Inanoglu, Ron Caneel
RAID
2001
Springer
13 years 11 months ago
Aggregation and Correlation of Intrusion-Detection Alerts
Abstract. This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterpris...
Hervé Debar, Andreas Wespi
E2EMON
2006
IEEE
14 years 1 months ago
Implementation and Evaluation of a Protocol for Detecting Network-Wide Threshold Crossing Alerts
— Threshold crossing alerts (TCAs) indicate to a management system that a management variable, associated with the state, performance or health of the network, has crossed a cert...
Fetahi Wuhib, Rolf Stadler, Alexander Clemm
RAID
2001
Springer
13 years 11 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner