Sciweavers

1013 search results - page 62 / 203
» Intrusion detection
Sort
View
ISCC
2006
IEEE
256views Communications» more  ISCC 2006»
14 years 4 months ago
A Wireless Distributed Intrusion Detection System and a New Attack Model
Denial-of-Service attacks, and jamming in particular, are a threat to wireless networks because they are at the same time easy to mount and difficult to detect and stop. We propo...
Marco Domenico Aime, Giorgio Calandriello, Antonio...
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
14 years 3 months ago
Elephant: Network Intrusion Detection Systems that Don't Forget
Modern Network Intrusion Detection Systems (NIDSs) maintain state that helps them accurately detect attacks. Because most NIDSs are signature-based, it is critical to update their...
Michael G. Merideth, Priya Narasimhan
DIAU
2000
Springer
14 years 2 months ago
On Pseudonymization of Audit Data for Intrusion Detection
In multilaterally secure intrusion detection systems (IDS) anonymity and accountability are potentially conflicting requirements. Since IDS rely on audit data to detect violations...
Joachim Biskup, Ulrich Flegel
SPIRE
2000
Springer
14 years 1 months ago
Fast Multipattern Search Algorithms for Intrusion Detection
We present new search algorithms to detect the occurrences of any pattern from a given pattern set in a text, allowing in the occurrences a limited number of spurious text charact...
Josué Kuri, Gonzalo Navarro
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 10 months ago
Strategic Alert Throttling for Intrusion Detection Systems
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
Gianni Tedesco, Uwe Aickelin