Sciweavers

282 search results - page 5 / 57
» Collaborative Intrusion Prevention
Sort
View
DIMVA
2004
13 years 8 months ago
Foundations for Intrusion Prevention
: We propose an infrastructure that helps a system administrator to identify a newly published vulnerability on the site hosts and to evaluate the vulnerability's threat with ...
Shai Rubin, Ian D. Alderman, David W. Parter, Mary...
CONEXT
2010
ACM
13 years 5 months ago
Network-wide deployment of intrusion detection and prevention systems
Vyas Sekar, Ravishankar Krishnaswamy, Anupam Gupta...
CSREASAM
2006
13 years 8 months ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
HOTI
2005
IEEE
14 years 1 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
IWAN
2004
Springer
14 years 25 days ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood