Sciweavers

529 search results - page 13 / 106
» CAMNEP: agent-based network intrusion detection system
Sort
View
RAID
2001
Springer
14 years 1 months ago
Interfacing Trusted Applications with Intrusion Detection Systems
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
Marc G. Welz, Andrew Hutchison
CN
2007
179views more  CN 2007»
13 years 8 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
14 years 9 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
AUSFORENSICS
2004
13 years 10 months ago
Wireless Snort - A WIDS in progress
The Snort intrusion detection system is a widely used and well-regarded open sourcesystem used for the detection of malicious activity in conventional wired networks. Recently, so...
Craig Valli