Sciweavers

194 search results - page 1 / 39
» Network-wide deployment of intrusion detection and preventio...
Sort
View
CONEXT
2010
ACM
13 years 5 months ago
Network-wide deployment of intrusion detection and prevention systems
Vyas Sekar, Ravishankar Krishnaswamy, Anupam Gupta...
ICETE
2004
204views Business» more  ICETE 2004»
13 years 8 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
PTS
2007
120views Hardware» more  PTS 2007»
13 years 8 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
IWAN
2004
Springer
14 years 23 days ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood
RAID
2005
Springer
14 years 27 days ago
FLIPS: Hybrid Adaptive Intrusion Prevention
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...