Sciweavers

1244 search results - page 134 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
VLDB
2005
ACM
112views Database» more  VLDB 2005»
15 years 10 months ago
REED: Robust, Efficient Filtering and Event Detection in Sensor Networks
This paper presents a set of algorithms for efficiently evaluating join queries over static data tables in sensor networks. We describe and evaluate three algorithms that take adv...
Daniel J. Abadi, Samuel Madden, Wolfgang Lindner
AAMAS
2006
Springer
15 years 4 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
LISA
2008
15 years 6 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
FGCN
2007
IEEE
106views Communications» more  FGCN 2007»
15 years 11 months ago
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of th...
Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Le...
136
Voted
DAC
2007
ACM
16 years 5 months ago
Compact State Machines for High Performance Pattern Matching
Pattern matching is essential to a wide range of applications such as network intrusion detection, virus scanning, etc. Pattern matching algorithms normally rely on state machines...
Piti Piyachon, Yan Luo