Sciweavers

201 search results - page 5 / 41
» Detecting Intrusions using System Calls: Alternative Data Mo...
Sort
View
ACSAC
1998
IEEE
14 years 25 days ago
An Architecture for Intrusion Detection Using Autonomous Agents
The Intrusion Detection System architectures commonly used in commercial and research systems have a number of problems that limit their configurability, scalability or efficiency...
J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D....
JSS
2002
198views more  JSS 2002»
13 years 8 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
ASIAN
2007
Springer
174views Algorithms» more  ASIAN 2007»
14 years 2 months ago
Combining Heterogeneous Classifiers for Network Intrusion Detection
Extensive use of computer networks and online electronic data and high demand for security has called for reliable intrusion detection systems. A repertoire of different classifier...
Ali Borji
CCS
2004
ACM
14 years 1 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
14 years 25 days ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok