Sciweavers

708 search results - page 91 / 142
» On the Use of Word Networks to Mimicry Attack Detection
Sort
View
IPPS
2005
IEEE
14 years 2 months ago
GUARD: Gossip Used for Autonomous Resource Detection
A growing trend in the development and deployment of grid computing systems is decentralization. Decentralizing these systems helps make them more scalable and robust, but poses s...
Sagnik Nandy, Larry Carter, Jeanne Ferrante
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
13 years 16 days ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
IEEEARES
2008
IEEE
14 years 3 months ago
Effective Monitoring of a Survivable Distributed Networked Information System
In 2002, DARPA put together a challenging proposition to the research community: demonstrate using an existing information system and available DARPA developed and other COTS tech...
Paul Rubel, Michael Atighetchi, Partha Pratim Pal,...
ICCCN
2007
IEEE
14 years 3 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
INFOCOM
2009
IEEE
14 years 3 months ago
Detecting Spam Zombies by Monitoring Outgoing Messages
—Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as DDoS, spamming, and identity theft. In t...
Zhenhai Duan, Peng Chen, Fernando Sanchez, Yingfei...