Sciweavers

86 search results - page 5 / 18
» Learning attack strategies from intrusion alerts
Sort
View
DSN
2005
IEEE
14 years 6 days ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
CORR
2010
Springer
123views Education» more  CORR 2010»
13 years 6 months ago
Integrating Innate and Adaptive Immunity for Intrusion Detection
Abstract. Network Intrusion Detection Systems (NIDS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches h...
Gianni Tedesco, Jamie Twycross, Uwe Aickelin
RAID
2001
Springer
13 years 11 months ago
Probabilistic Alert Correlation
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
Alfonso Valdes, Keith Skinner
IJCNN
2000
IEEE
13 years 11 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady
IQ
2007
13 years 8 months ago
An Alert Management Approach To Data Quality: Lessons Learned From The Visa Data Authority Program
: We introduce an end-to-end framework for data quality that integrates business strategy, data quality models, and supporting investigative and governance processes. We also descr...
Joseph Bugajski, Robert L. Grossman