Sciweavers

800 search results - page 94 / 160
» Intrusion Detection Systeme (IDS)
Sort
View
SIGCOMM
2009
ACM
14 years 3 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
EUROPAR
2006
Springer
14 years 16 days ago
Supporting a Real-Time Distributed Intrusion Detection Application on GATES
Increasingly, a number of applications across computer sciences and other science and engineering disciplines rely on, or can potentially benefit from, analysis and monitoring of d...
Qian Zhu, Liang Chen, Gagan Agrawal
ACSAC
1999
IEEE
14 years 1 months ago
Architecture and Concepts of the ARGuE Guard
ARGuE (Advanced Research Guard for Experimentation) is a prototype guard being developed as a basis for experimentation. ARGuE is based on Network Associates' Gauntlet firewa...
Jeremy Epstein
SP
1996
IEEE
100views Security Privacy» more  SP 1996»
14 years 1 months ago
A Sense of Self for Unix Processes
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that t...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
RAID
2005
Springer
14 years 2 months ago
Behavioral Distance for Intrusion Detection
We introduce a notion, behavioral distance, for evaluating the extent to which processes—potentially running different programs and executing on different platforms—behave si...
Debin Gao, Michael K. Reiter, Dawn Xiaodong Song