Sciweavers

5 search results - page 1 / 1
» Bayesian-Networks-Based Misuse and Anomaly Prevention System
Sort
View
ICEIS
2008
IEEE
13 years 11 months ago
Bayesian-Networks-Based Misuse and Anomaly Prevention System
Pablo Garcia Bringas, Yoseba K. Penya, Stefano Par...
ICEIS
2008
IEEE
13 years 11 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
CCS
2006
ACM
13 years 8 months ago
Puppetnets: misusing web browsers as a distributed attack infrastructure
Most of the recent work on Web security focuses on preventing attacks that directly harm the browser's host machine and user. In this paper we attempt to quantify the threat ...
V. T. Lam, Spyros Antonatos, Periklis Akritidis, K...
ACSAC
2008
IEEE
13 years 11 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
DEXAW
2008
IEEE
121views Database» more  DEXAW 2008»
13 years 11 months ago
Experiences on Designing an Integral Intrusion Detection System
Network Intrusion Detection Systems (NIDS) have the challenge to prevent network attacks and unauthorised remote use of computers. In order to achieve this goal, NIDS usually foll...
Yoseba K. Penya, Pablo Garcia Bringas