Sciweavers

54 search results - page 8 / 11
» On the difficulty of scalably detecting network attacks
Sort
View
ACSAC
2003
IEEE
14 years 6 days ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
IPPS
2010
IEEE
13 years 6 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
USS
2008
13 years 11 months ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...
ISCC
2009
IEEE
254views Communications» more  ISCC 2009»
14 years 3 months ago
Monitoring connectivity in wireless sensor networks
It is important to have continuous connectivity in a wireless sensor network after it is deployed in a hostile environment. However, such networks are constrained by the low usert...
Benahmed Khelifa, Hafid Haffaf, Madjid Merabti, Da...
ACSAC
2007
IEEE
14 years 2 months ago
Tracking Darkports for Network Defense
We exploit for defensive purposes the concept of darkports – the unused ports on active systems. We are particularly interested in such ports which transition to become active (...
David Whyte, Paul C. van Oorschot, Evangelos Krana...