Sciweavers

1013 search results - page 70 / 203
» Intrusion detection
Sort
View
IJNSEC
2006
205views more  IJNSEC 2006»
13 years 10 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
JSAC
2006
172views more  JSAC 2006»
13 years 10 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
SIGSOFT
2011
ACM
13 years 5 months ago
Modeling a distributed intrusion detection system using collaborative building blocks
Developing complex distributed systems is a non-trivial task. It is even more difficult when the systems need to dynamically reconfigure the distributed functionalities or tasks...
Linda Ariani Gunawan, Michael Vogel, Frank Alexand...
CNSR
2008
IEEE
169views Communications» more  CNSR 2008»
14 years 4 months ago
Critical Episode Mining in Intrusion Detection Alerts
One of the most important steps in attack detection using Intrusion Detection Systems (IDSs) is dealing with huge number of alerts that can be either critical single alerts and mu...
Mahboobeh Soleimani, Ali A. Ghorbani
RAID
2000
Springer
14 years 1 months ago
Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection
Abstract. Privacy and surveillance by intrusion detection are potentially conflicting organizational and legal requirements. In order to support a balanced solution, audit data is ...
Joachim Biskup, Ulrich Flegel