Sciweavers

217 search results - page 10 / 44
» Modeling a distributed intrusion detection system using coll...
Sort
View
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 1 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
ACMSE
2005
ACM
13 years 9 months ago
Simulating application level self-similar network traffic using hybrid heavy-tailed distributions
Many networking researches depend on an accurate simulation of network traffic. For example, Intrusion Detection Systems generally require tuning to be effective in each new envir...
Song Luo, Gerald A. Marin
CSREASAM
2006
13 years 9 months ago
Gibraltar: A Mobile Host-Based Intrusion Protection System
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...
Grant A. Jacoby, Thadeus Hickman, Stuart Warders, ...
IWIA
2006
IEEE
14 years 1 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock