Sciweavers

226 search results - page 17 / 46
» Intrusion Detection using Continuous Time Bayesian Networks
Sort
View
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
14 years 24 days ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
HPCC
2007
Springer
14 years 1 months ago
Continuous Adaptive Outlier Detection on Distributed Data Streams
In many applications, stream data are too voluminous to be collected in a central fashion and often transmitted on a distributed network. In this paper, we focus on the outlier det...
Liang Su, Weihong Han, Shuqiang Yang, Peng Zou, Ya...
ICC
2007
IEEE
109views Communications» more  ICC 2007»
14 years 1 months ago
Real Time Detection of Link Failures in Inter Domain Routing
Abstract— Measurements have shown that network path failures occur frequently in the Internet and physical link failures can cause network instability in large scale and severity...
Xiaobo Long, Biplab Sikdar
RAID
1999
Springer
13 years 11 months ago
IDS Standards: Lessons Learned to Date
: I will discuss two efforts to get Intrusion Detection Systems to work together - the Common Intrusion Detection Framework (CIDF), and the IETF's working group to develop an ...
Stuart Staniford-Chen
JSAC
2006
128views more  JSAC 2006»
13 years 7 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum