Sciweavers

312 search results - page 18 / 63
» Operational experiences with high-volume network intrusion d...
Sort
View
COMCOM
2008
145views more  COMCOM 2008»
13 years 8 months ago
A game-theoretic intrusion detection model for mobile ad hoc networks
In this paper, we address the problem of increasing the effectiveness of an intrusion detection system (IDS) for a cluster of nodes in ad hoc networks. To reduce the performance o...
Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad De...
DSN
2005
IEEE
14 years 1 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
CHI
2007
ACM
13 years 12 months ago
Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...
IMC
2004
ACM
14 years 1 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
RAID
1999
Springer
14 years 4 days ago
Intrusion Detection for an On-Going Attack
An intrusion-detection system (IDS) for an on-going attack is described. Prior to an attack, an IDS operates in anticipation of a general threat. During an attack, the IDS can dea...
Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Y...