Sciweavers

421 search results - page 46 / 85
» SCIDS: A Soft Computing Intrusion Detection System
Sort
View
DSN
2006
IEEE
14 years 4 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
RAID
2005
Springer
14 years 3 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
CCS
2004
ACM
14 years 3 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
VTC
2006
IEEE
117views Communications» more  VTC 2006»
14 years 4 months ago
Low Complexity Soft Interference Cancellation for MIMO-Systems
— Iterative equalization has emerged as an efficient means of achieving near-capacity detection performance in multiple-antenna (MIMO) systems. However, many proposed detection ...
Steffen Bittner, Ernesto Zimmermann, Gerhard Fettw...
FCCM
2005
IEEE
102views VLSI» more  FCCM 2005»
14 years 3 months ago
A Signature Match Processor Architecture for Network Intrusion Detection
In this paper, we introduce a novel architecture for a hardware based network intrusion detection system (NIDS). NIDSs are becoming critical components of the network infrastructu...
Janardhan Singaraju, Long Bu, John A. Chandy