Sciweavers

142 search results - page 16 / 29
» Statistical Approaches to DDoS Attack Detection and Response
Sort
View
GLOBECOM
2009
IEEE
13 years 11 months ago
An Analytical Model of Routing, Misbehavior, and Countermeasures in Mobile Ad Hoc Networks
Abstract--We present an analytical model combining geometric and stochastic approaches to describe the effects of attacks and countermeasures on MANETs. In particular, we focus on ...
André König, Daniel Seither, Ralf Stei...
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 8 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
FORTE
2004
13 years 9 months ago
A Temporal Logic Based Framework for Intrusion Detection
Abstract. We propose a framework for intrusion detection that is based on runtime monitoring of temporal logic specifications. We specify intrusion patterns as formulas in an expre...
Prasad Naldurg, Koushik Sen, Prasanna Thati
BMCBI
2006
108views more  BMCBI 2006»
13 years 8 months ago
Promoter prediction and annotation of microbial genomes based on DNA sequence and structural responses to superhelical stress
Background: In our previous studies, we found that the sites in prokaryotic genomes which are most susceptible to duplex destabilization under the negative superhelical stresses t...
Huiquan Wang, Craig J. Benham
IJISEC
2006
106views more  IJISEC 2006»
13 years 8 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis