Sciweavers

496 search results - page 16 / 100
» The use of computational intelligence in intrusion detection...
Sort
View
DSN
2005
IEEE
14 years 1 months ago
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment
Distributed systems with multiple interacting services, such as distributed e-commerce systems, are suitable targets for malicious attacks because of the potential financial impac...
Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagc...
IEEEIAS
2009
IEEE
14 years 2 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
RAID
2000
Springer
13 years 11 months ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
AWIC
2004
Springer
13 years 11 months ago
Attribute Reduction for Effective Intrusion Detection
Abstract. Computer intrusion detection is to do with identifying computer activities that may compromise the integrity, confidentiality or the availability of an IT system. Anomaly...
Fernando Godínez, Dieter Hutter, Raul Monro...
AINA
2008
IEEE
14 years 2 months ago
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot
When traditional firewall and intrusion detection systems (IDS) are used to detect possible attacks from the network, they often make wrong decisions and block the legitimate conn...
Babak Khosravifar, Jamal Bentahar