Sciweavers

529 search results - page 68 / 106
» CAMNEP: agent-based network intrusion detection system
Sort
View
NDSS
2006
IEEE
14 years 2 months ago
Isolating Intrusions by Automatic Experiments
When dealing with malware infections, one of the first tasks is to find the processes that were involved in the attack. We introduce Malfor, a system that isolates those process...
Stephan Neuhaus, Andreas Zeller
ICC
2007
IEEE
128views Communications» more  ICC 2007»
13 years 8 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine
ICCCN
2007
IEEE
14 years 3 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
AI
2008
Springer
14 years 3 months ago
Using Unsupervised Learning for Network Alert Correlation
Alert correlation systems are post-processing modules that enable intrusion analysts to find important alerts and filter false positives efficiently from the output of Intrusion...
Reuben Smith, Nathalie Japkowicz, Maxwell Dondo, P...
RAID
1999
Springer
14 years 27 days ago
Intrusion Detection for an On-Going Attack
An intrusion-detection system (IDS) for an on-going attack is described. Prior to an attack, an IDS operates in anticipation of a general threat. During an attack, the IDS can dea...
Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Y...