Sciweavers

682 search results - page 102 / 137
» KIDS - Keyed Intrusion Detection System
Sort
View
ICC
2007
IEEE
137views Communications» more  ICC 2007»
14 years 4 months ago
A Novel Algorithm and Architecture for High Speed Pattern Matching in Resource-Limited Silicon Solution
— Network Intrusion Detection Systems (NIDS) are more and more important for identifying and preventing the malicious attacks over the network. This paper proposes a novel cost-e...
Nen-Fu Huang, Yen-Ming Chu, Chi-Hung Tsai, Chen-Yi...
CORR
2010
Springer
110views Education» more  CORR 2010»
13 years 10 months ago
Real-Time Alert Correlation with Type Graphs
The premise of automated alert correlation is to accept that false alerts from a low level intrusion detection system are inevitable and use attack models to explain the output in ...
Gianni Tedesco, Uwe Aickelin
ACSAC
2005
IEEE
14 years 3 months ago
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities...
Stig Andersson, Andrew Clark, George M. Mohay, Bra...
DIMVA
2006
13 years 11 months ago
A Fast Worm Scan Detection Tool for VPN Congestion Avoidance
Finding the cause for congested virtual private network (VPN) links that connect an office network over the Internet to remote subsidiaries can be a hassle. Scan traffic of worm i...
Arno Wagner, Thomas Dübendorfer, Roman Hiesta...
WEBI
2009
Springer
14 years 4 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham