Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
—We examine a widely accepted myth about passive listening in wireless networks, and give a detailed description of how to achieve real “passive listening.” Then we develop a...
Rare events analysis is an area that includes methods for the detection and prediction of events, e.g. a network intrusion or an engine failure, that occur infrequently and have s...