Sciweavers

988 search results - page 60 / 198
» Intrusion Detection with Neural Networks
Sort
View
108
Voted
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
15 years 4 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
144
Voted
WCNC
2008
IEEE
15 years 10 months ago
A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET
—In this paper, we study the election of multiple leaders for intrusion detection in the presence of selfish nodes in mobile ad hoc networks (MANETs). To balance the resource co...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
136
Voted
RAID
2001
Springer
15 years 8 months ago
Aggregation and Correlation of Intrusion-Detection Alerts
Abstract. This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterpris...
Hervé Debar, Andreas Wespi
143
Voted
ICETE
2004
204views Business» more  ICETE 2004»
15 years 5 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
138
Voted
CCS
2010
ACM
15 years 3 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler