Sciweavers

800 search results - page 1 / 160
» Intrusion Detection Systeme (IDS)
Sort
View
CSREASAM
2006
13 years 8 months ago
TRINETR: Facilitating Alerts Analysis and Response Decision Making
Due to many inherent deficiencies and flaws, current intrusion detection systems (IDS) are plagued by numerous problems. Intrusion Detection Systems are often inefficient and inef...
Jinqiao Yu, Y. V. Ramana Reddy, Sumitra Reddy
IEEEIAS
2008
IEEE
14 years 1 months ago
Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything...
Václav Snásel, Jan Platos, Pavel Kr&...
ICT
2004
Springer
181views Communications» more  ICT 2004»
14 years 25 days ago
Attack Evidence Detection, Recovery, and Signature Extraction with ADenoIdS
Abstract. This paper presents the ADenoIdS intrusion detection system (IDS). ADenoIdS takes some architectural inspiration from the human immune system and automates intrusion reco...
F. S. de Paula, P. L. de Geus
CIS
2007
Springer
14 years 1 months ago
A Context-Based Analysis of Intrusion Detection for Policy Violation
Existing intrusion detection systems (IDS) operate independently from security policy enforcement mechanism. In current IDS the functionality has been restricted to detecting only...
Kaiyu Wan, Vasu S. Alagar, Zongyuan Yang
COMCOM
2002
143views more  COMCOM 2002»
13 years 7 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt