Sciweavers

708 search results - page 53 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
IPPS
2007
IEEE
14 years 3 months ago
Distributed IDS using Reconfigurable Hardware
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the compo...
Ashok Kumar Tummala, Parimal Patel
INFOCOM
2007
IEEE
14 years 3 months ago
TriBiCa: Trie Bitmap Content Analyzer for High-Speed Network Intrusion Detection
Abstract—Deep packet inspection (DPI) is often used in network intrusion detection and prevention systems (NIDPS), where incoming packet payloads are compared against known attac...
N. Sertac Artan, H. Jonathan Chao
CNSR
2008
IEEE
108views Communications» more  CNSR 2008»
14 years 3 months ago
A Novel Covariance Matrix Based Approach for Detecting Network Anomalies
During the last decade, anomaly detection has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks. However, hav...
Mahbod Tavallaee, Wei Lu, Shah Arif Iqbal, Ali A. ...
DSN
2008
IEEE
14 years 3 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
14 years 2 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala