Sciweavers

231 search results - page 11 / 47
» Distributed and Scalable Intrusion Detection System Based on...
Sort
View
CCS
2004
ACM
14 years 27 days ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
13 years 11 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
HAIS
2010
Springer
14 years 9 days ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
ATAL
2005
Springer
14 years 1 months ago
A distributed services based conference planner application using software agents, grid services and web services
This demonstration highlights the applications of our research work i.e. second generation (Scalable Fault Tolerant Agent Grooming Environment – SAGE) Multi Agent System, Integr...
M. Omair Shafiq, Arshad Ali, Amina Tariq, Amna Bas...
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 1 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...