Sciweavers

191 search results - page 13 / 39
» On Detecting Camouflaging Worm
Sort
View
IJSN
2008
80views more  IJSN 2008»
13 years 9 months ago
Syntax vs. semantics: competing approaches to dynamic network intrusion detection
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...
Walter J. Scheirer, Mooi Choo Chuah
ICANNGA
2009
Springer
201views Algorithms» more  ICANNGA 2009»
14 years 4 months ago
A Novel Signal-Based Approach to Anomaly Detection in IDS Systems
In this paper we present our original methodology, in which Matching Pursuit is used for networks anomaly and intrusion detection. The architecture of anomaly-based IDS based on si...
Lukasz Saganowski, Michal Choras, Rafal Renk, Wito...
DMIN
2006
152views Data Mining» more  DMIN 2006»
13 years 11 months ago
Anomaly Detection Using the Dempster-Shafer Method
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two standard benchmark problems we show that by combining multiple signals it is pos...
Qi Chen, Uwe Aickelin
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 10 months ago
Dempster-Shafer for Anomaly Detection
In this paper, we implement an anomaly detection system using the Dempster-Shafer method. Using two standard benchmark problems we show that by combining multiple signals it is pos...
Qi Chen, Uwe Aickelin
TON
2008
103views more  TON 2008»
13 years 9 months ago
On the race of worms, alerts, and patches
We study the effectiveness of automatic patching and quantify the speed of patch or alert dissemination required for worm containment. We focus on random scanning as this is repres...
Milan Vojnovic, Ayalvadi J. Ganesh