Sciweavers

708 search results - page 60 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
NPL
2006
113views more  NPL 2006»
13 years 8 months ago
A Back-propagation Neural Network Landmine Detector Using the Delta-technique and S-statistic
Landmines are a major problem facing the world today; there are millions of these deadly weapons still buried in various countries around the world. Humanitarian organizations dedi...
Taskin Koçak, Matthew Draper
CCS
2007
ACM
14 years 3 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
CIIT
2007
195views Communications» more  CIIT 2007»
13 years 10 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
ECBS
2007
IEEE
188views Hardware» more  ECBS 2007»
13 years 10 months ago
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...
RAID
1999
Springer
14 years 1 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf