Sciweavers

912 search results - page 94 / 183
» Anomaly
Sort
View
CW
2003
IEEE
14 years 2 months ago
Utilizing Statistical Characteristics of N-grams for Intrusion Detection
Information and infrastructure security is a serious issue of global concern. As the last line of defense for security infrastructure, intrusion detection techniques are paid more...
Zhuowei Li, Amitabha Das, Sukumar Nandi
ICDCS
2003
IEEE
14 years 2 months ago
Experiences With Monitoring OSPF on a Regional Service Provider Network
This paper presents the results from a detailed, experimental study of OSPF, an intra-domain routing protocol, running on a mid-size regional Internet service provider. Using mult...
David Watson, Farnam Jahanian, Craig Labovitz
AUSAI
2003
Springer
14 years 2 months ago
Combining Multiple Host-Based Detectors Using Decision Tree
Abstract. As the information technology grows interests in the intrusion detection system (IDS), which detects unauthorized usage, misuse by a local user and modification of impor...
Sang-Jun Han, Sung-Bae Cho
ICECCS
2002
IEEE
85views Hardware» more  ICECCS 2002»
14 years 1 months ago
Syntactic Fault Patterns in OO Programs
Although program faults are widely studied, there are many aspects of faults that we still do not understand, particularly about OO software. In addition to the simple fact that o...
Roger T. Alexander, Jeff Offutt, James M. Bieman
SIGCOMM
1997
ACM
14 years 1 months ago
Internet Routing Instability
Abstract—This paper examines the network interdomain routing information exchanged between backbone service providers at the major U.S. public Internet exchange points. Internet ...
Craig Labovitz, G. Robert Malan, Farnam Jahanian