Sciweavers

971 search results - page 126 / 195
» Autonomic Intrusion Detection System
Sort
View
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 9 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
ACSAC
2005
IEEE
14 years 2 months ago
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities...
Stig Andersson, Andrew Clark, George M. Mohay, Bra...
DIMVA
2006
13 years 10 months ago
A Fast Worm Scan Detection Tool for VPN Congestion Avoidance
Finding the cause for congested virtual private network (VPN) links that connect an office network over the Internet to remote subsidiaries can be a hassle. Scan traffic of worm i...
Arno Wagner, Thomas Dübendorfer, Roman Hiesta...
P2P
2009
IEEE
101views Communications» more  P2P 2009»
14 years 3 months ago
Monitoring and Management of Structured Peer-to-Peer Systems
The peer-to-peer paradigm shows the potential to provide the same functionality and quality like client/server based systems, but with much lower costs. In order to control the qu...
Kalman Graffi, Dominik Stingl, Julius Rueckert, Al...
WEBI
2009
Springer
14 years 3 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham