Sciweavers

1013 search results - page 44 / 203
» Environment-Sensitive Intrusion Detection
Sort
View
118
Voted
CCS
2007
ACM
15 years 8 months ago
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention
Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise. Yet it remai...
José M. González, Vern Paxson, Nicho...
106
Voted
CCS
2009
ACM
16 years 3 months ago
Intrusion response cost assessment methodology
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
87
Voted
RAID
1999
Springer
15 years 6 months ago
Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks
Yves Cosendai, Marc Dacier, Paolo Scotton
104
Voted
SDM
2003
SIAM
124views Data Mining» more  SDM 2003»
15 years 4 months ago
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection
Aleksandar Lazarevic, Levent Ertöz, Vipin Kum...