Sciweavers

682 search results - page 9 / 137
» KIDS - Keyed Intrusion Detection System
Sort
View
IEEEARES
2006
IEEE
14 years 3 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
ICIAP
2005
ACM
14 years 10 months ago
Analyzing TCP Traffic Patterns Using Self Organizing Maps
The continuous evolution of the attacks against computer networks has given renewed strength to research on anomaly based Intrusion Detection Systems, capable of automatically dete...
Stefano Zanero
IRI
2005
IEEE
14 years 3 months ago
Exploiting efficient data mining techniques to enhance intrusion detection systems
- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...
CNSM
2010
13 years 7 months ago
Effective acquaintance management for Collaborative Intrusion Detection Networks
Abstract--An effective Collaborative Intrusion Detection Network (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their knowledge and opinions...
Carol J. Fung, Jie Zhang, Raouf Boutaba
SP
2006
IEEE
123views Security Privacy» more  SP 2006»
14 years 3 months ago
A Framework for the Evaluation of Intrusion Detection Systems
Classification accuracy in intrusion detection systems (IDSs) deals with such fundamental problems as how to compare two or more IDSs, how to evaluate the performance of an IDS, ...
Alvaro A. Cárdenas, John S. Baras, Karl Sea...