Sciweavers

357 search results - page 8 / 72
» An Approach to Detect Executable Content for Anomaly Based N...
Sort
View
129
Voted
ACSAC
1998
IEEE
15 years 8 months ago
NetSTAT: A Network-Based Intrusion Detection Approach
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to...
Giovanni Vigna, Richard A. Kemmerer
114
Voted
GECCO
2006
Springer
145views Optimization» more  GECCO 2006»
15 years 7 months ago
Immune anomaly detection enhanced with evolutionary paradigms
The paper presents an approach based on principles of immune systems to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by b...
Marek Ostaszewski, Franciszek Seredynski, Pascal B...
129
Voted
WETICE
2005
IEEE
15 years 9 months ago
Entropy Based Worm and Anomaly Detection in Fast IP Networks
Detecting massive network events like worm outbreaks in fast IP networks, such as Internet backbones, is hard. One problem is that the amount of traffic data does not allow real-t...
Arno Wagner, Bernhard Plattner
141
Voted
IJNSEC
2008
117views more  IJNSEC 2008»
15 years 3 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
168
Voted
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 10 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...