Sciweavers

1013 search results - page 12 / 203
» Intrusion detection
Sort
View
CSREASAM
2006
13 years 11 months ago
Novel Attack Detection Using Fuzzy Logic and Data Mining
: - Intrusion Detection Systems are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffect...
Norbik Bashah Idris, Bharanidharan Shanmugam
CNSM
2010
13 years 7 months ago
Effective acquaintance management for Collaborative Intrusion Detection Networks
Abstract--An effective Collaborative Intrusion Detection Network (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their knowledge and opinions...
Carol J. Fung, Jie Zhang, Raouf Boutaba
ACSAC
2003
IEEE
14 years 3 months ago
Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model
In [1], we proposed a model for policy-based intrusion detection, based on information flow control. In the present paper, we show its applicability and effectiveness on a stand...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...
STORAGESS
2005
ACM
14 years 3 months ago
Storage-based file system integrity checker
In this paper we present a storage based intrusion detection system (IDS) which uses time and space efficient point-intime copy and performs file system integrity checks to detec...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
INFFUS
2002
162views more  INFFUS 2002»
13 years 9 months ago
Fusion of multiple classifiers
The security of computer networks plays a strategic role in modern computer systems. In order to enforce high protection levels against threats, a number of software tools have be...
Fabio Roli, Josef Kittler