Sciweavers

458 search results - page 10 / 92
» Automatic Evaluation of Intrusion Detection Systems
Sort
View
CN
1999
128views more  CN 1999»
13 years 7 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
CORR
2010
Springer
158views Education» more  CORR 2010»
13 years 7 months ago
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Intrusion detection systems have become a key component in ensuring the safety of systems and networks. As networks grow in size and speed continues to increase, it is crucial tha...
Mueen Uddin, Azizah Abdul Rahman
ACSC
2005
IEEE
14 years 1 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie
IJNSEC
2008
117views more  IJNSEC 2008»
13 years 7 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin