Sciweavers

CORR
2010
Springer
106views Education» more  CORR 2010»
13 years 10 months ago
Simulation of Computer Network Attacks
In this work we present a prototype for simulating computer network attacks. Our objective is to simulate large networks (thousands of hosts, with applications and vulnerabilities)...
Carlos Sarraute, Fernando Miranda, José Ign...
JSAC
2006
137views more  JSAC 2006»
13 years 11 months ago
Adaptive Defense Against Various Network Attacks
In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...
APNOMS
2008
Springer
14 years 1 months ago
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
As network attacks have increased in number and severity over the past few years, intrusion detection system (IDS) is increasingly becoming a critical component to secure the netwo...
Huy Anh Nguyen, Deokjai Choi
AICCSA
2005
IEEE
105views Hardware» more  AICCSA 2005»
14 years 5 months ago
Multivariate statistical analysis for network attacks detection
Detection and self-protection against viruses, worms, and network attacks is urgently needed to protect network systems and their applications from catastrophic failures. Once a n...
Guangzhi Qu, Salim Hariri, Mazin S. Yousif
ISCC
2006
IEEE
127views Communications» more  ISCC 2006»
14 years 5 months ago
Aggregating Distributed Sensor Data for Network Intrusion Detection
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky
VIZSEC
2007
Springer
14 years 5 months ago
Visualizing Network Security Events Using Compound Glyphs from a Service-Oriented Perspective
ct Network security is the complicated field of controlling access within a computer network. One of the difficulties in network security is detecting the presence, severity, and ...
Jason Pearlman, Penny Rheingans
DEXAW
2008
IEEE
121views Database» more  DEXAW 2008»
14 years 6 months ago
Experiences on Designing an Integral Intrusion Detection System
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
Yoseba K. Penya, Pablo Garcia Bringas