Sciweavers

1244 search results - page 97 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
INFOCOM
2006
IEEE
15 years 10 months ago
Contribution of Anomalies Detection and Analysis on Traffic Engineering
—In this paper we present a methodology for detecting traffic anomalies. To accomplish that, and as a demarcation from similar works, we combine multi-scale and multi-criteria an...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
STORAGESS
2005
ACM
15 years 10 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
USENIX
2007
15 years 6 months ago
Load Shedding in Network Monitoring Applications
Monitoring and mining real-time network data streams is crucial for managing and operating data networks. The information that network operators desire to extract from the network...
Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanju&...
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
15 years 10 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
147
Voted
SIGMOD
2001
ACM
142views Database» more  SIGMOD 2001»
16 years 4 months ago
Outlier Detection for High Dimensional Data
The outlier detection problem has important applications in the eld of fraud detection, network robustness analysis, and intrusion detection. Most such applications are high dimen...
Charu C. Aggarwal, Philip S. Yu