Sciweavers

1013 search results - page 47 / 203
» Intrusion detection
Sort
View
RAID
2000
Springer
14 years 1 months ago
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. Three weeks of training and two weeks of test data were generated on a test ...
Richard Lippmann, Joshua W. Haines, David J. Fried...
DSN
2006
IEEE
14 years 4 months ago
VoIP Intrusion Detection Through Interacting Protocol State Machines
Being a fast-growing Internet application, Voice over Internet Protocol (VoIP) shares the network resources with the regular Internet traffic, and is susceptible to the existing ...
Hemant Sengar, Duminda Wijesekera, Haining Wang, S...
SAC
2004
ACM
14 years 3 months ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi
TSMC
2008
172views more  TSMC 2008»
13 years 9 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
NDSS
2003
IEEE
14 years 3 months ago
A Virtual Machine Introspection Based Architecture for Intrusion Detection
Today’s architectures for intrusion detection force the IDS designer to make a difficult choice. If the IDS resides on the host, it has an excellent view of what is happening i...
Tal Garfinkel, Mendel Rosenblum