Sciweavers

112 search results - page 11 / 23
» Contribution of Anomalies Detection and Analysis on Traffic ...
Sort
View
CCS
2008
ACM
13 years 9 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
LISA
2007
13 years 10 months ago
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems
We present an architecture1 designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and a...
Damiano Bolzoni, Bruno Crispo, Sandro Etalle
TIFS
2008
142views more  TIFS 2008»
13 years 7 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
IJIPT
2006
58views more  IJIPT 2006»
13 years 7 months ago
On protocol engineering: detect, confirm and adjust
: In this paper, we depart from TCP-Probing (Tsaoussidis and Badr, 2000) and propose an experimental transport protocol that achieves energy and throughput performance gains in mix...
Ioannis Psaras, Lefteris Mamatas, Vassilis Tsaouss...
ICST
2009
IEEE
14 years 2 months ago
The Effectiveness of Automated Static Analysis Tools for Fault Detection and Refactoring Prediction
Many automated static analysis (ASA) tools have been developed in recent years for detecting software anomalies. The aim of these tools is to help developers to eliminate software...
Fadi Wedyan, Dalal Alrmuny, James M. Bieman