Sciweavers

319 search results - page 2 / 64
» A Compound Intrusion Detection Model
Sort
View
CNSR
2005
IEEE
112views Communications» more  CNSR 2005»
13 years 11 months ago
Generating Representative Traffic for Intrusion Detection System Benchmarking
In this paper, a modeling and simulation framework is proposed for generating data for training and testing intrusion detection systems. The framework can develop models of web us...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
CN
2007
179views more  CN 2007»
13 years 5 months ago
Protecting host-based intrusion detectors through virtual machines
: Intrusion detection systems continuously watch the activity of a network or computer, looking for attack or intrusion evidences. However, hostbased intrusion detectors are partic...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
AINA
2007
IEEE
13 years 12 months ago
A Cost-Sensitive Model for Preemptive Intrusion Response Systems
The proliferation of complex and fast-spreading intrusions not only requires advances in intrusion detection mechanisms but also demands development of sophisticated and automated...
Natalia Stakhanova, Samik Basu, Johnny Wong
ETRICS
2006
13 years 9 months ago
Requirements of Information Reductions for Cooperating Intrusion Detection Agents
Abstract. We consider cooperating intrusion detection agents that limit the cooperation information flow with a focus on privacy and confidentiality. Generalizing our previous work...
Ulrich Flegel, Joachim Biskup
ACSAC
1998
IEEE
13 years 10 months ago
NetSTAT: A Network-Based Intrusion Detection Approach
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to...
Giovanni Vigna, Richard A. Kemmerer