Sciweavers

1244 search results - page 34 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
145
Voted
RAID
2001
Springer
15 years 8 months ago
Interfacing Trusted Applications with Intrusion Detection Systems
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
Marc G. Welz, Andrew Hutchison
ACMSE
2006
ACM
15 years 5 months ago
Hybrid intelligent systems for network security
Society has grown to rely on Internet services, and the number of Internet users increases every day. As more and more users become connected to the network, the window of opportu...
J. Lane Thames, Randal Abler, Ashraf Saad
FCCM
2004
IEEE
141views VLSI» more  FCCM 2004»
15 years 7 months ago
Deep Packet Filter with Dedicated Logic and Read Only Memories
Searching for multiple string patterns in a stream of data is a computationally expensive task. The speed of the search pattern module determines the overall performance of deep p...
Young H. Cho, William H. Mangione-Smith
RAID
1999
Springer
15 years 8 months ago
Combining Knowledge Discovery and Knowledge Engineering to Build IDSs
We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
Wenke Lee, Salvatore J. Stolfo
138
Voted
RAID
2009
Springer
15 years 10 months ago
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems
Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel