Sciweavers

1013 search results - page 37 / 203
» Storage-Based Intrusion Detection
Sort
View
153
Voted
CN
1999
128views more  CN 1999»
15 years 2 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
118
Voted
CCS
2007
ACM
15 years 8 months ago
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention
Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise. Yet it remai...
José M. González, Vern Paxson, Nicho...
106
Voted
CCS
2009
ACM
16 years 3 months ago
Intrusion response cost assessment methodology
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
87
Voted
RAID
1999
Springer
15 years 6 months ago
Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks
Yves Cosendai, Marc Dacier, Paolo Scotton