Sciweavers

RAID
1999
Springer
14 years 3 months ago
IDS Standards: Lessons Learned to Date
: I will discuss two efforts to get Intrusion Detection Systems to work together - the Common Intrusion Detection Framework (CIDF), and the IETF's working group to develop an ...
Stuart Staniford-Chen
RAID
1999
Springer
14 years 3 months ago
New directions for the AAFID architecture
Eugene H. Spafford, Diego Zamboni
RAID
1999
Springer
14 years 3 months ago
Anomaly Intrusion Detection Systems: Handling Temporal Relations Between Events
Lately, many approaches have been developed to discover computer abuse. Some of them use data mining techniques to discover anomalous behavior in audit trail, considering this beh...
Alexandr Seleznyov, Seppo Puuronen
RAID
1999
Springer
14 years 3 months ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield
RAID
1999
Springer
14 years 3 months ago
Session State Transition Based Large Network IDS
In order to present large-scale malicious attacks on an ISP network to maintain network services, we have designed a method to record key packets classified by sessions. Session i...
Qianli Zhang, Xing Li
RAID
1999
Springer
14 years 3 months ago
Misuse Detection in Database Systems Through User Profiling
Christina Yip Chung, Michael Gertz, Karl N. Levitt
RAID
1999
Springer
14 years 3 months ago
SNMS - Shadow Network Management System
Putting in more security measures and access controls within an organisation runs contrary to operational e ciency and convenience. Although the balance between security and opera...
Tiang Hwee Ong, Chung Pheng Tan, Yong Tai Tan, Chr...