Sciweavers

425 search results - page 64 / 85
» Audit
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
COMPSAC
2004
IEEE
13 years 11 months ago
Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing
Web services (WS) received significant attention recently because services can be searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic reconfi...
Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin...
ETRICS
2006
13 years 11 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
ACSAC
2001
IEEE
13 years 11 months ago
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris
eXpert-BSM is a real time forward-reasoning expert system that analyzes Sun Solaris audit trails. Based on many years of intrusion detection research, eXpert-BSM's knowledge ...
Ulf Lindqvist, Phillip A. Porras
RAID
2000
Springer
13 years 11 months ago
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. Three weeks of training and two weeks of test data were generated on a test ...
Richard Lippmann, Joshua W. Haines, David J. Fried...