Sciweavers

428 search results - page 11 / 86
» Intrusion Detection System to Detect Wormhole Using Fault Lo...
Sort
View
163
Voted
FTCS
1993
111views more  FTCS 1993»
15 years 5 months ago
Detection and Discrimination of Injected Network Faults
Although the present work does in fact employ training data, it does so in the interest of calibrating the results Six hundred faults were induced by injection into five live obtai...
Roy A. Maxion, Robert T. Olszewski
122
Voted
IEAAIE
2004
Springer
15 years 9 months ago
Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach
This paper investigates the suitability of linear genetic programming (LGP) technique to model efficient intrusion detection systems, while comparing its performance with artificia...
Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
CCR
2004
94views more  CCR 2004»
15 years 3 months ago
Honeycomb: creating intrusion detection signatures using honeypots
Abstract-- This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and p...
Christian Kreibich, Jon Crowcroft
116
Voted
ICEIS
2002
IEEE
15 years 8 months ago
DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions
: The most valuable information assets of an organization are often stored in databases and it is pertinent for such organizations to ensure the integrity and confidentiality of t...
Wai Lup Low, Joseph Lee, Peter Teoh
141
Voted
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 9 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...