Sciweavers

971 search results - page 52 / 195
» Autonomic Intrusion Detection System
Sort
View
ACSAC
2000
IEEE
14 years 2 days ago
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux
Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system c...
Thomas E. Daniels, Eugene H. Spafford
LISA
2004
13 years 9 months ago
I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System
Swapnil Patil, Anand Kashyap, Gopalan Sivathanu, E...
HPCC
2007
Springer
14 years 1 months ago
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections
As Grids become increasingly relied upon as critical infrastructure, it is imperative to ensure the highly-available and secure day-to-day operation of the Grid infrastructure. The...
Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill,...
SOSP
2005
ACM
14 years 4 months ago
Detecting past and present intrusions through vulnerability-specific predicates
Ashlesha Joshi, Samuel T. King, George W. Dunlap, ...
JSAC
2006
163views more  JSAC 2006»
13 years 7 months ago
Fast and Scalable Pattern Matching for Network Intrusion Detection Systems
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packets....
Sarang Dharmapurikar, John W. Lockwood