Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky
- Network Intrusion Detection Systems (NIDS) capture large amounts of data that is difficult or impractical to report and analyze directly from the capture device. It is also commo...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Ouliter deTector (SPOT), t...
In this paper, we propose a distributed hierarchical intrusion detection system, for ad hoc wireless networks, based on a power level metric for potential ad hoc hosts, which is us...
T. Srinivasan, Jayesh Seshadri, J. B. Siddharth Jo...
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...