Sciweavers

1013 search results - page 29 / 203
» Environment-Sensitive Intrusion Detection
Sort
View
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
14 years 8 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
IAW
2003
IEEE
14 years 1 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
IJDSN
2006
136views more  IJDSN 2006»
13 years 7 months ago
Intrusion Detection for Routing Attacks in Sensor Networks
Security is a critical challenge for creating robust and reliable sensor networks. For example, routing attacks have the ability to disconnect a sensor network from its central ba...
Chong Eik Loo, Mun Yong Ng, Christopher Leckie, Ma...
AIMS
2007
Springer
14 years 1 months ago
A Survey of the High-Speed Self-learning Intrusion Detection Research Area
Intrusion detection for IP networks has been a research theme for a number of years already. One of the challenges is to keep up with the ever increasing Internet usage and network...
Anna Sperotto, Remco van de Meent
VIIP
2001
13 years 9 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher