Sciweavers

282 search results - page 39 / 57
» Monitoring Network Traffic to Detect Stepping-Stone Intrusio...
Sort
View
CCECE
2006
IEEE
14 years 2 months ago
Detecting Distributed Denial of Service Attack Traffic at the Agent Machines
Due to financial losses caused by Distributed Denial of Service (DDoS) attacks, most defence mechanisms have been deployed at the network where the target server is located. We be...
Vicky Laurens, Abdulmotaleb El-Saddik, Pulak Dhar,...
GI
2009
Springer
13 years 6 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
DSOM
2007
Springer
14 years 3 months ago
NADA - Network Anomaly Detection Algorithm
This paper deals with a new iterative Network Anomaly Detection Algorithm – NADA, which accomplishes the detection, classification and identification of traffic anomalies. NADA f...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
CSREASAM
2006
13 years 10 months ago
Gibraltar: A Mobile Host-Based Intrusion Protection System
Although mobile devices are globally omnipresent, security developments for these devices have not kept pace with their technological advancements. Thus, mobile devices are increa...
Grant A. Jacoby, Thadeus Hickman, Stuart Warders, ...

Lecture Notes
404views
15 years 6 months ago
Network Security
A comprehensive treatment of network security. Topics include remote access security, DMZ, firewalls, VPNs, PKI architecture, X.509 Public key infrastructure, web security, S-HTTP,...
Raj Jain