Sciweavers

440 search results - page 28 / 88
» Intrusion Detection: A Bioinformatics Approach
Sort
View
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
14 years 28 days ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
ICANN
2005
Springer
14 years 4 months ago
Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
This research employs unsupervised pattern recognition to approach the thorny issue of detecting anomalous network behavior. It applies a connectionist model to identify user behav...
Emilio Corchado, Álvaro Herrero, José...
BIBE
2007
IEEE
154views Bioinformatics» more  BIBE 2007»
14 years 5 months ago
A Compartmentalized Approach to the Assembly of Physical Maps
We propose a novel compartmentalized method for the assembly of physical maps from fingerprinted clones. Our assembler exploits the presence of genetic markers at the global leve...
Serdar Bozdag, Timothy J. Close, Stefano Lonardi
RAID
2007
Springer
14 years 5 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...