Sciweavers

765 search results - page 4 / 153
» Detecting Anomalies and Intruders
Sort
View
SPIN
2012
Springer
11 years 8 months ago
Counterexample Explanation by Anomaly Detection
Since counterexamples generated by model checking tools are only symptoms of faults in the model, a significant amount of manual work is required in order to locate the fault that...
Stefan Leue, Mitra Tabaei Befrouei
IEEEIAS
2009
IEEE
14 years 14 days ago
Detecting Stepping-Stone Intruders with Long Connection Chains
: A common technique hacker use is to route their traffic through a chain of stepping-stone hosts. It is generally agreed that there is no valid reason to use a long connection cha...
Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephe...
CGA
2004
13 years 5 months ago
Detecting Flaws and Intruders with Visual Data Analysis
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, T. ...
ICCNMC
2005
Springer
13 years 11 months ago
Improved Thumbprint and Its Application for Intrusion Detection
This paper proposes RTT-thumbprint to traceback intruders, and to detect stepping-stone intrusion; RTT-thumbprint is a sequence of timestamp pairs of a send packet and its correspo...
Jianhua Yang, Shou-Hsuan Stephen Huang