In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
Distributed Denial-of-Service (DDoS) attacks seriously threat the servers in the Internet. Most of current research is focused on the detection and prevention methods at the victim...
This paper describes results concerning the robustness and generalization capabilities of kernel methods in detecting coordinated distributed multiple attacks (CDMA) using network...
Srinivas Mukkamala, Krishna Yendrapalli, Ram B. Ba...
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Since most current network attacks happen at the application layer, analysis of packet payload is necessary for their detection. Unfortunately malicious packets may be crafted to m...