Sciweavers

587 search results - page 11 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
ICDCSW
2005
IEEE
14 years 2 months ago
Adaptive Real-Time Anomaly Detection with Improved Index and Ability to Forget
Anomaly detection in IP networks, detection of deviations from what is considered normal, is an important complement to misuse detection based on known attack descriptions. Perfor...
Kalle Burbeck, Simin Nadjm-Tehrani
IJNSEC
2008
131views more  IJNSEC 2008»
13 years 9 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
OOPSLA
2000
Springer
14 years 17 days ago
Scalable propagation-based call graph construction algorithms
Propagation-based call graph construction algorithms have been studied intensively in the 1990s, and differ primarily in the number of sets that are used to approximate run-time v...
Frank Tip, Jens Palsberg
GCA
2008
13 years 10 months ago
Anomaly Detection and its Application in Grid
- Size and complexity of grid computing systems increase rapidly. Failures can have adverse effect on application executing on the system. Thus, failure information should be provi...
Thuy Nguyen, Thanh Do, Dung Nguyen, Hiep Nguyen, T...
IJNSEC
2008
117views more  IJNSEC 2008»
13 years 9 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin