Sciweavers

682 search results - page 46 / 137
» KIDS - Keyed Intrusion Detection System
Sort
View
IPPS
2007
IEEE
14 years 4 months ago
Distributed IDS using Reconfigurable Hardware
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the compo...
Ashok Kumar Tummala, Parimal Patel
ICETE
2004
253views Business» more  ICETE 2004»
13 years 11 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
RAID
1999
Springer
14 years 2 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
ACSAC
2000
IEEE
14 years 2 months ago
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux
Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system c...
Thomas E. Daniels, Eugene H. Spafford
LISA
2004
13 years 11 months ago
I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System
Swapnil Patil, Anand Kashyap, Gopalan Sivathanu, E...