Sciweavers

407 search results - page 4 / 82
» A Framework for the Evaluation of Intrusion Detection System...
Sort
View
COMCOM
2002
143views more  COMCOM 2002»
13 years 5 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt
ESORICS
2006
Springer
13 years 9 months ago
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Hai Wang, Peng Liu
ISCIS
2004
Springer
13 years 11 months ago
Behavioral Intrusion Detection
Abstract. In this paper we describe anomaly-based intrusion detection as a specialized case of the more general behavior detection problem. We draw concepts from the field of etho...
Stefano Zanero
HICSS
2003
IEEE
211views Biometrics» more  HICSS 2003»
13 years 11 months ago
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to i...
Oleg Kachirski, Ratan K. Guha
AINA
2007
IEEE
14 years 12 days ago
A Cost-Sensitive Model for Preemptive Intrusion Response Systems
The proliferation of complex and fast-spreading intrusions not only requires advances in intrusion detection mechanisms but also demands development of sophisticated and automated...
Natalia Stakhanova, Samik Basu, Johnny Wong