Sciweavers

428 search results - page 3 / 86
» Intrusion Detection System to Detect Wormhole Using Fault Lo...
Sort
View
ACSAC
2004
IEEE
14 years 9 days ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
VLDB
2007
ACM
164views Database» more  VLDB 2007»
14 years 8 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
JACIII
2008
101views more  JACIII 2008»
13 years 8 months ago
On-Line Fault Detection and Compensation of Hydraulic Driven Machines Using Modelling Techniques
The development of on line model-based fault detection systems in machinery improves the operational reliability of industrial systems and reduces the operational and maintenance ...
Chrissanthi Angeli, Avraam Chatzinikolaou
ISICA
2009
Springer
14 years 3 months ago
Detecting Network Anomalies Using CUSUM and EM Clustering
Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Wei Lu, Hengjian Tong
INFOCOM
2007
IEEE
14 years 2 months ago
Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information
Abstract—We propose a novel algorithm for detecting wormhole attacks in wireless multi-hop networks. The algorithm uses only connectivity information to look for forbidden substr...
Ritesh Maheshwari, Jie Gao, Samir R. Das