Sciweavers

8177 search results - page 115 / 1636
» Detecting System Emulators
Sort
View
ACSAC
2003
IEEE
14 years 1 months ago
A Stateful Intrusion Detection System for World-Wide Web Servers
Web servers are ubiquitous, remotely accessible, and often misconfigured. In addition, custom web-based applications may introduce vulnerabilities that are overlooked even by the ...
Giovanni Vigna, William K. Robertson, Vishal Kher,...
CIKM
2003
Springer
14 years 3 months ago
Misuse detection for information retrieval systems
We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating att...
Rebecca Cathey, Ling Ma, Nazli Goharian, David A. ...
CCS
1999
ACM
14 years 2 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise speciļ¬cations that characterize normal and abnormal network packet sequences. Our speciļ...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
AINA
2008
IEEE
14 years 4 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar
WCRE
2005
IEEE
14 years 3 months ago
Design Pattern Detection in Eiffel Systems
The use of design patterns in a software system can provide strong indications about the rationale behind the systemā€™s design. As a result, automating the detection of design pa...
Wei Wang, Vassilios Tzerpos