Sciweavers

6 search results - page 1 / 2
» Intrusion response cost assessment methodology
Sort
View
CCS
2009
ACM
14 years 5 months ago
Intrusion response cost assessment methodology
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
COMPSAC
2009
IEEE
13 years 9 months ago
A Framework for Cost Sensitive Assessment of Intrusion Response Selection
Abstract—In recent years, cost-sensitive intrusion response has gained significant interest, mainly due to its emphasis on the balance between potential damage incurred by the i...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
IAW
2003
IEEE
13 years 10 months ago
Wireless Intrusion Detection and Response
— Intrusion detection and countermeasures response is an active area of research. In this paper, we examine integrating an intrusion detection engine with an active countermeasur...
Yu-Xi Lim, Tim Schmoyer, John G. Levine, Henry L. ...
TMA
2010
Springer
150views Management» more  TMA 2010»
13 years 2 months ago
A Database of Anomalous Traffic for Assessing Profile Based IDS
This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
Philippe Owezarski
HASE
2007
IEEE
13 years 11 months ago
SyncProbe: Providing Assurance of Message Latency through Predictive Monitoring of Internet Paths
SyncProbe improves the end-to-end predictability of distributed systems by providing applications with a real-time estimate of the maximum expected message delay (upper bound on c...
Jawwad Shamsi, Monica Brockmeyer