Sciweavers

244 search results - page 25 / 49
» Multi-agent approach to network intrusion detection
Sort
View
ISCA
2005
IEEE
134views Hardware» more  ISCA 2005»
14 years 1 months ago
A High Throughput String Matching Architecture for Intrusion Detection and Prevention
Network Intrusion Detection and Prevention Systems have emerged as one of the most effective ways of providing security to those connected to the network, and at the heart of alm...
Lin Tan, Timothy Sherwood
ISW
2009
Springer
14 years 2 months ago
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
Abstract. The complexity of modern network architectures and the epidemic diffusion of malware require collaborative approaches for defense. We present a novel distributed system ...
Mirco Marchetti, Michele Messori, Michele Colajann...
SIGCOMM
2009
ACM
14 years 2 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
RAID
1999
Springer
13 years 11 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
RAID
2005
Springer
14 years 1 months ago
COTS Diversity Based Intrusion Detection and Application to Web Servers
Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
Eric Totel, Frédéric Majorczyk, Ludo...