Sciweavers

77 search results - page 3 / 16
» Classification Agent-Based Techniques for Detecting Intrusio...
Sort
View
TEC
2002
89views more  TEC 2002»
13 years 5 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
ICARIS
2007
Springer
13 years 11 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
HAIS
2010
Springer
13 years 10 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
IEEEIAS
2009
IEEE
14 years 11 hour ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
ACMSE
2006
ACM
13 years 11 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta