Sciweavers

772 search results - page 57 / 155
» Network Intrusion Detection Using Genetic Clustering
Sort
View
ACSAC
2003
IEEE
14 years 10 days ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
GLOBECOM
2007
IEEE
14 years 3 months ago
Aggregated Bloom Filters for Intrusion Detection and Prevention Hardware
—Bloom Filters (BFs) are fundamental building blocks in various network security applications, where packets from high-speed links are processed using state-of-the-art hardwareba...
N. Sertac Artan, Kaustubh Sinkar, Jalpa Patel, H. ...
IPPS
2006
IEEE
14 years 2 months ago
Fault and intrusion tolerance of wireless sensor networks
The following three questions should be answered in developing new topology with more powerful ability to tolerate node-failure in wireless sensor network. First, what is node-fai...
Liang-min Wang, Jianfeng Ma, Chao Wang, A. C. Kot
CCS
2008
ACM
13 years 10 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
SEC
1996
13 years 10 months ago
Intention modelling: approximating computer user intentions for detection and prediction of intrusions
This paper introduces and describes an innovative modelling approach which utilises models that are synthesised through approximate calculations of user actions and extensive repr...
Thomas Spyrou, John Darzentas