Sciweavers

1098 search results - page 7 / 220
» Proactive Intrusion Detection
Sort
View
CIS
2007
Springer
14 years 1 months ago
A Context-Based Analysis of Intrusion Detection for Policy Violation
Existing intrusion detection systems (IDS) operate independently from security policy enforcement mechanism. In current IDS the functionality has been restricted to detecting only...
Kaiyu Wan, Vasu S. Alagar, Zongyuan Yang
CSREASAM
2006
13 years 8 months ago
TRINETR: Facilitating Alerts Analysis and Response Decision Making
Due to many inherent deficiencies and flaws, current intrusion detection systems (IDS) are plagued by numerous problems. Intrusion Detection Systems are often inefficient and inef...
Jinqiao Yu, Y. V. Ramana Reddy, Sumitra Reddy
CNSR
2005
IEEE
112views Communications» more  CNSR 2005»
14 years 1 months ago
Generating Representative Traffic for Intrusion Detection System Benchmarking
In this paper, a modeling and simulation framework is proposed for generating data for training and testing intrusion detection systems. The framework can develop models of web us...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
ETRICS
2006
13 years 11 months ago
Requirements of Information Reductions for Cooperating Intrusion Detection Agents
Abstract. We consider cooperating intrusion detection agents that limit the cooperation information flow with a focus on privacy and confidentiality. Generalizing our previous work...
Ulrich Flegel, Joachim Biskup
JNCA
2007
179views more  JNCA 2007»
13 years 7 months ago
Modeling intrusion detection system using hybrid intelligent systems
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper p...
Sandhya Peddabachigari, Ajith Abraham, Crina Grosa...