Sciweavers

971 search results - page 162 / 195
» Autonomic Intrusion Detection System
Sort
View
GI
2005
Springer
14 years 2 months ago
Ein Ansatz zur Virtualisierung der Analyse von Audit-Daten
: Intrusion-Detection-Systeme (IDS) haben sich als wichtiges Instrument für den Schutz informationstechnischer Systeme erwiesen. Die meisten heute eingesetzten IDS realisieren ein...
Sebastian Schmerl
ISW
2005
Springer
14 years 2 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
RAID
2001
Springer
14 years 1 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
14 years 12 days ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
ICSE
2008
IEEE-ACM
14 years 8 months ago
LISABETH: automated content-based signature generator for zero-day polymorphic worms
Modern worms can spread so quickly that any countermeasure based on human reaction might not be fast enough. Recent research has focused on devising algorithms to automatically pr...
Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Matti...