Sciweavers

357 search results - page 40 / 72
» Intrusion Detection System Based on Multi-class SVM
Sort
View
CCS
2004
ACM
14 years 1 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
SECURWARE
2008
IEEE
14 years 2 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin
ACMSE
2006
ACM
14 years 1 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
CRITIS
2007
13 years 9 months ago
A Malware Detector Placement Game for Intrusion Detection
We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
NSPW
2004
ACM
14 years 1 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman