Sciweavers

194 search results - page 34 / 39
» Network-wide deployment of intrusion detection and preventio...
Sort
View
FCCM
2004
IEEE
163views VLSI» more  FCCM 2004»
14 years 7 days ago
Implementation Results of Bloom Filters for String Matching
Network Intrusion Detection and Prevention Systems (IDPS) use string matching to scan Internet packets for malicious content. Bloom filters offer a mechanism to search for a large...
Michael Attig, Sarang Dharmapurikar, John W. Lockw...
SIGCOMM
2010
ACM
13 years 8 months ago
NetShield: massive semantics-based vulnerability signature matching for high-speed networks
Accuracy and speed are the two most important metrics for Network Intrusion Detection/Prevention Systems (NIDS/NIPSes). Due to emerging polymorphic attacks and the fact that in ma...
Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen...
JNSM
2008
93views more  JNSM 2008»
13 years 8 months ago
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs
We optimally place intrusion detection system (IDS) sensors and prioritize IDS alerts using attack graph analysis. We begin by predicting all possible ways of penetrating a networ...
Steven Noel, Sushil Jajodia
AVSS
2006
IEEE
14 years 2 months ago
Learning Foveal Sensing Strategies in Unconstrained Surveillance Environments
In this paper we report on techniques for automatically learning foveal sensing strategies for an active pan-tiltzoom camera. The approach uses reinforcement learning to discover ...
Andrew D. Bagdanov, Alberto Del Bimbo, Walter Nunz...
SEC
2008
13 years 10 months ago
Collaborative architecture for malware detection and analysis
The constant increase of malware threats clearly shows that the present countermeasures are not sufficient especially because most actions are put in place only when infections hav...
Michele Colajanni, Daniele Gozzi, Mirco Marchetti