Sciweavers

IWIA
2005
IEEE
14 years 6 months ago
Forensic Analysis of File System Intrusions Using Improved Backtracking
Intrusion detection systems alert the system administrators of intrusions but, in most cases, do not provide details about which system events are relevant to the intrusion and ho...
Sriranjani Sitaraman, Subbarayan Venkatesan
IWIA
2005
IEEE
14 years 6 months ago
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks
This paper proposes a methodology to develop countermeasures against code injection attacks, and validates the methodology by working out a specific countermeasure. This methodol...
Yves Younan, Wouter Joosen, Frank Piessens
IWIA
2005
IEEE
14 years 6 months ago
SAWAN: A Survivable Architecture for Wireless LANs
This paper1 describes survivability schemes against Access Point (AP) failures in Wireless LANs. It particularly aims for resiliency and survivability against multistage attacks w...
Mohit Virendra, Shambhu J. Upadhyaya, Vivek Kumar,...
IWIA
2005
IEEE
14 years 6 months ago
Meta IDS Environments: An Event Message Anomaly Detection Approach
Jens Tölle, Marko Jahnke, Michael Bussmann, S...
IWIA
2005
IEEE
14 years 6 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
IWIA
2005
IEEE
14 years 6 months ago
Attack-Potential-Based Survivability Modeling for High-Consequence Systems
Previous quantitative models of security or survivability have been defined on a range of probable intruder behavior. This measures survivability as a statistic such as mean time...
John McDermott
IWIA
2005
IEEE
14 years 6 months ago
Enforcing Messaging Security Policies
A system for enforcing messaging security policies for both store and forward and streaming messaging protocols on COTS operating system platforms is described. Messaging protocol...
Jaromir Likavec, Stephen D. Wolthusen
IWIA
2005
IEEE
14 years 6 months ago
Stellar: A Fusion System for Scenario Construction and Security Risk Assessment
Stellar aggregates and correlates alerts from heterogeneous network defense systems, building scenarios and estimating the security risk of the entire scenario. Prior work conside...
Stephen Boyer, Oliver Dain, Robert Cunningham
IWIA
2005
IEEE
14 years 6 months ago
Malware Defense Using Network Security Authentication
Malware defenses have primarily relied upon intrusion fingerprints to detect suspicious network behavior. While effective for discovering computers that are already compromised,...
Joseph V. Antrosio, Errin W. Fulp