Sciweavers

1244 search results - page 35 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 8 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
CONEXT
2010
ACM
15 years 1 months ago
Network-wide deployment of intrusion detection and prevention systems
Vyas Sekar, Ravishankar Krishnaswamy, Anupam Gupta...
IEEECIT
2010
IEEE
15 years 2 months ago
Selective and Early Threat Detection in Large Networked Systems
—The complexity of modern networked information systems, as well as all the defense-in-depth best practices, require distributed intrusion detection architectures relying on the ...
Michele Colajanni, Mirco Marchetti, Michele Messor...
CNSR
2008
IEEE
155views Communications» more  CNSR 2008»
15 years 10 months ago
Detecting Network Anomalies Using Different Wavelet Basis Functions
Signal processing techniques have been applied recently for analyzing and detecting network anomalies due to their potential to find novel or unknown intrusions. In this paper, we...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
IWCMC
2006
ACM
15 years 9 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu