Sciweavers

282 search results - page 14 / 57
» Monitoring Network Traffic to Detect Stepping-Stone Intrusio...
Sort
View
HOTI
2005
IEEE
14 years 2 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood
HOTOS
2009
IEEE
14 years 18 days ago
An End to the Middle
The last fifteen years has seen a vast proliferation of middleboxes to solve all manner of persistent limitations in the Internet protocol suite. Examples include firewalls, NATs,...
Colin Dixon, Arvind Krishnamurthy, Thomas E. Ander...
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
14 years 9 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
ICANN
2005
Springer
14 years 2 months ago
Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
This research employs unsupervised pattern recognition to approach the thorny issue of detecting anomalous network behavior. It applies a connectionist model to identify user behav...
Emilio Corchado, Álvaro Herrero, José...
DSN
2004
IEEE
14 years 14 days ago
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments
Voice over IP (VoIP) systems are gaining in popularity as the technology for transmitting voice traffic over IP networks. As the popularity of VoIP systems increases, they are bei...
Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Si...