Sciweavers

412 search results - page 4 / 83
» An Empirical Approach to Modeling Uncertainty in Intrusion A...
Sort
View
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
14 years 2 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
PTS
2007
120views Hardware» more  PTS 2007»
13 years 10 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 9 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
COMPSAC
2005
IEEE
14 years 2 months ago
An Empirical Performance Study for Validating a Performance Analysis Approach: PSIM
Performance analysis gains more attention in recent years by researchers who focus their study on the early software development stages to mitigate the risk of redesign as problem...
Jinchun Xia, Yujia Ge, Carl K. Chang
ATAL
2008
Springer
13 years 10 months ago
Multi-agent approach to network intrusion detection
Our demo presents an agent-based intrusion detection system designed for deployment on high-speed backbone networks. The major contribution of the system is the integration of sev...
Martin Rehák, Michal Pechoucek, Pavel Celed...