Sciweavers

120 search results - page 14 / 24
» Dismantling intrusion prevention systems
Sort
View
IJNSEC
2006
81views more  IJNSEC 2006»
13 years 7 months ago
Survivability Analysis of A Cluster System with 4th Generation Security Mechanism: Regeneration
Cluster systems have been gradually more popular and are being broadly used in a variety of applications. On the other hand, many of those systems are not tolerant to system failu...
Khin Mi Mi Aung, Kiejin Park, Jong Sou Park
ICARIS
2007
Springer
13 years 11 months ago
Defence Against 802.11 DoS Attacks Using Artificial Immune System
In this paper we present an Artificial Immune System (AIS) based security framework, which prevents a number of serious Denial of Service (DoS) attacks. The proposed security frame...
M. Zubair Shafiq, Muddassar Farooq
GLOBECOM
2010
IEEE
13 years 4 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
IJIPT
2010
147views more  IJIPT 2010»
13 years 6 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 7 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti