Sciweavers

1013 search results - page 84 / 203
» Environment-Sensitive Intrusion Detection
Sort
View
120
Voted
ACSAC
1999
IEEE
15 years 7 months ago
An Application of Machine Learning to Network Intrusion Detection
Differentiating anomalous network activity from normal network traffic is difficult and tedious. A human analyst must search through vast amounts of data to find anomalous sequenc...
Chris Sinclair, Lyn Pierce, Sara Matzner
149
Voted
FPGA
2008
ACM
161views FPGA» more  FPGA 2008»
15 years 4 months ago
Implementing high-speed string matching hardware for network intrusion detection systems
This paper presents high-throughput techniques for implementing FSM based string matching hardware on FPGAs. By taking advantage of the fact that string matching operations for di...
Atul Mahajan, Benfano Soewito, Sai K. Parsi, Ning ...
83
Voted
CSREASAM
2006
15 years 4 months ago
Network Intrusion Detection System with Data Mart
- Network Intrusion Detection Systems (NIDS) capture large amounts of data that is difficult or impractical to report and analyze directly from the capture device. It is also commo...
Richard Wasniowski
146
Voted
CSREASAM
2006
15 years 4 months ago
Comparison of Two Sampling-Based Data Collection Mechanisms for Intrusion Detection System
- Data collection mechanism is a crucial factor for the performance of intrusion detection system (IDS). Simple random sampling and Stratified random sampling techniques of statist...
Kuo Zhao, Liang Hu, Guannan Gong, Meng Zhang, Kexi...
123
Voted
ACMSE
2006
ACM
15 years 8 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta