Sciweavers

682 search results - page 19 / 137
» KIDS - Keyed Intrusion Detection System
Sort
View
AIMS
2007
Springer
14 years 4 months ago
A Survey of the High-Speed Self-learning Intrusion Detection Research Area
Intrusion detection for IP networks has been a research theme for a number of years already. One of the challenges is to keep up with the ever increasing Internet usage and network...
Anna Sperotto, Remco van de Meent
DBSEC
2001
115views Database» more  DBSEC 2001»
13 years 11 months ago
Randomly roving agents for intrusion detection
Agent based intrusion detection systems IDS have advantages such as scalability, recon gurability, and survivability. In this paper, we introduce a mobile-agent based IDS, called ...
Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth...
RAID
1999
Springer
14 years 2 months ago
Improving Intrusion Detection Performance using Keyword Selection and Neural Networks
The most common computer intrusion detection systems detect signatures of known attacks by searching for attack-specific keywords in network traffic. Many of these systems suffer ...
Richard Lippmann, Robert K. Cunningham
DEON
2008
Springer
13 years 11 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
ICMLA
2003
13 years 11 months ago
Robust Support Vector Machines for Anomaly Detection in Computer Security
— Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared...
Wenjie Hu, Yihua Liao, V. Rao Vemuri