Sciweavers

2236 search results - page 5 / 448
» Intrusion detection techniques and approaches
Sort
View
IEAAIE
2004
Springer
14 years 1 months ago
Modeling Intrusion Detection Systems Using Linear Genetic Programming Approach
This paper investigates the suitability of linear genetic programming (LGP) technique to model efficient intrusion detection systems, while comparing its performance with artificia...
Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham
IEEEIAS
2008
IEEE
14 years 2 months ago
Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything...
Václav Snásel, Jan Platos, Pavel Kr&...
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
14 years 1 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
ICARIS
2004
Springer
14 years 1 months ago
Immune System Approaches to Intrusion Detection - A Review
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of ...
Uwe Aickelin, Julie Greensmith, Jamie Twycross
ACSAC
1998
IEEE
14 years 9 hour ago
NetSTAT: A Network-Based Intrusion Detection Approach
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to...
Giovanni Vigna, Richard A. Kemmerer