Sciweavers

1244 search results - page 138 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
WORM
2004
15 years 6 months ago
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Self-propagating computer worms have been terrorizing the Internet for the last several years. With the increasing density, inter-connectivity and bandwidth of the Internet combin...
Frank Castaneda, Emre Can Sezer, Jun Xu
PAM
2007
Springer
15 years 10 months ago
Leveraging BitTorrent for End Host Measurements
Traditional methods of conducting measurements to end hosts require sending unexpected packets to measurement targets. Although existing techniques can ascertain end host character...
Tomas Isdal, Michael Piatek, Arvind Krishnamurthy,...
133
Voted
CSREASAM
2010
15 years 1 months ago
Modeling NIDS Evasion with Genetic Programming
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
Sergio Pastrana, Agustín Orfila, Arturo Rib...
FPL
2003
Springer
100views Hardware» more  FPL 2003»
15 years 9 months ago
An Extensible, System-On-Programmable-Chip, Content-Aware Internet Firewall
An extensible firewall has been implemented that performs packet filtering, content scanning, and per-flow queuing of Internet packets at Gigabit/second rates. The firewall use...
John W. Lockwood, Christopher E. Neely, Christophe...
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
16 years 4 months ago
ORDEN: outlier region detection and exploration in sensor networks
Sensor networks play a central role in applications that monitor variables in geographic areas such as the traffic volume on roads or the temperature in the environment. A key fea...
Conny Franke, Michael Gertz