Sciweavers

587 search results - page 52 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
IV
2002
IEEE
114views Visualization» more  IV 2002»
14 years 3 months ago
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
Tetsuji Takada, Hideki Koike
IAT
2006
IEEE
14 years 4 months ago
Sixth-Sense: Context Reasoning for Potential Objects Detection in Smart Sensor Rich Environment
A new system named Sixth-Sense is proposed for obtaining physical world information in smart space. Our view is object-centered and sensors are attached to several objects in the ...
Bin Guo, Satoru Satake, Michita Imai
ACSAC
2001
IEEE
14 years 1 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
JMLR
2010
185views more  JMLR 2010»
13 years 5 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
INFOCOM
2012
IEEE
12 years 22 days ago
Origin-destination flow measurement in high-speed networks
—An origin-destination (OD) flow between two routers is the set of packets that pass both routers in a network. Measuring the sizes of OD flows is important to many network man...
Tao Li, Shigang Chen, Yan Qiao