Sciweavers

186 search results - page 1 / 38
» Operational Characteristics of an Automated Intrusion Respon...
Sort
View
CMS
2003
14 years 8 days ago
Operational Characteristics of an Automated Intrusion Response System
Maria Papadaki, Steven Furnell, Benn Lines, Paul L...
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
14 years 4 months ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich
DSN
2005
IEEE
14 years 4 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
JCS
2002
103views more  JCS 2002»
13 years 10 months ago
Toward Cost-Sensitive Modeling for Intrusion Detection and Response
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion...
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. S...
AINA
2007
IEEE
14 years 5 months ago
A Cost-Sensitive Model for Preemptive Intrusion Response Systems
The proliferation of complex and fast-spreading intrusions not only requires advances in intrusion detection mechanisms but also demands development of sophisticated and automated...
Natalia Stakhanova, Samik Basu, Johnny Wong