Sciweavers

1013 search results - page 12 / 203
» Environment-Sensitive Intrusion Detection
Sort
View
132
Voted
TISSEC
2010
119views more  TISSEC 2010»
14 years 9 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
135
Voted
COMCOM
2002
189views more  COMCOM 2002»
15 years 2 months ago
Intrusion detection techniques and approaches
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion Detection systems offer techniques for modelling and...
Theuns Verwoerd, Ray Hunt
137
Voted
SP
2002
IEEE
170views Security Privacy» more  SP 2002»
15 years 2 months ago
Alert Correlation in a Cooperative Intrusion Detection Framework
This paper presents the work we have done within the MIRADOR project to design CRIM, a cooperative module for intrusion detection systems (IDS). This module implements functions t...
Frédéric Cuppens, Alexandre Mi&egrav...
161
Voted
INFOCOM
2011
IEEE
14 years 6 months ago
Reconciling privacy preservation and intrusion detection in sensory data aggregation
—When wireless sensors are deployed to monitor the working or life conditions of people, the data collected and processed by these sensors may reveal privacy of people. The actua...
Chuang Wang, Guiling Wang, Wensheng Zhang 0001, Ta...
163
Voted
JCS
1998
338views more  JCS 1998»
15 years 2 months ago
Intrusion Detection Using Sequences of System Calls
A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a g...
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaj...