Sciweavers

376 search results - page 16 / 76
» Visual Detection of Design Anomalies
Sort
View
CEEMAS
2007
Springer
14 years 1 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
CIA
2007
Springer
14 years 1 months ago
High-Performance Agent System for Intrusion Detection in Backbone Networks
Abstract. This paper presents a design of high-performance agentbased intrusion detection system designed for deployment on high-speed network links. To match the speed requirement...
Martin Rehák, Michal Pechoucek, Pavel Celed...
CORR
2006
Springer
152views Education» more  CORR 2006»
13 years 7 months ago
APHRODITE: an Anomaly-based Architecture for False Positive Reduction
We present APHRODITE, an architecture designed to reduce false positives in network intrusion-detection systems. APHRODITE works by detecting anomalies in the outgoing traffic, an...
Damiano Bolzoni, Sandro Etalle
MINENET
2006
ACM
14 years 1 months ago
Toward sophisticated detection with distributed triggers
Recent research has proposed efficient protocols for distributed triggers, which can be used in monitoring infrastructures to maintain system-wide invariants and detect abnormal ...
Ling Huang, Minos N. Garofalakis, Joseph M. Heller...
CORR
2010
Springer
92views Education» more  CORR 2010»
13 years 6 months ago
Network Intrusion Detection Using FP Tree Rules
----------------------------------------------ABSTRACT-------------------------------------------In the faceless world of the Internet, online fraud is one of the greatest reasons ...
P. Srinivasulu, J. Ranga Rao, I. Ramesh Babu