Sciweavers

1424 search results - page 37 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
ICEIS
2008
IEEE
14 years 2 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
SPIN
2009
Springer
14 years 2 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
IJSN
2008
80views more  IJSN 2008»
13 years 8 months ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah
ACISICIS
2009
IEEE
14 years 2 months ago
BackupIT: An Intrusion-Tolerant Cooperative Backup System
Reliable storage of large amounts of data is always a delicate issue. Availability, efficiency, data integrity, and confidentiality are some features a data backup system should...
Sérgio Raymundo Loest, Marcelo Cheminn Madr...
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 6 months ago
Network Intrusion Detection Using FP Tree Rules
----------------------------------------------ABSTRACT-------------------------------------------In the faceless world of the Internet, online fraud is one of the greatest reasons ...
P. Srinivasulu, J. Ranga Rao, I. Ramesh Babu