Sciweavers

226 search results - page 9 / 46
» Intrusion Detection using Continuous Time Bayesian Networks
Sort
View
CCR
2004
94views more  CCR 2004»
13 years 7 months ago
Honeycomb: creating intrusion detection signatures using honeypots
Abstract-- This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and p...
Christian Kreibich, Jon Crowcroft
CVPR
1999
IEEE
14 years 9 months ago
Time-Series Classification Using Mixed-State Dynamic Bayesian Networks
We present a novel mixed-state dynamic Bayesian network (DBN) framework for modeling and classifying timeseries data such as object trajectories. A hidden Markov model (HMM) of di...
Vladimir Pavlovic, Brendan J. Frey, Thomas S. Huan...
ASIAMS
2008
IEEE
14 years 2 months ago
Data Reduction and Ensemble Classifiers in Intrusion Detection
Efficiency is one of the major issues in intrusion detection. Inefficiency is often attributed to high overhead and this is caused by several reasons. Among them are continuous de...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...
RAID
2005
Springer
14 years 29 days ago
Interactive Visualization for Network and Port Scan Detection
Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connect...
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
INFOCOM
1997
IEEE
13 years 11 months ago
Proactive Network Fault Detection
The increasing role of communication networks in today’s society results in a demand for higher levels of network availability and reliability. At the same time, fault managemen...
Cynthia S. Hood, Chuanyi Ji