Sciweavers

98 search results - page 19 / 20
» Rule Generalisation in Intrusion Detection Systems using Sno...
Sort
View
CSFW
2006
IEEE
13 years 11 months ago
On the Completeness of Attack Mutation Algorithms
An attack mutation algorithm takes a known instance of an attack and transforms it into many distinct instances by repeatedly applying attack transformations. Such algorithms are ...
Shai Rubin, Somesh Jha, Barton P. Miller
NETWORKING
2010
13 years 7 months ago
Bidirectional Range Extension for TCAM-Based Packet Classification
Abstract. Packet classification is a fundamental task for network devices such as edge routers, firewalls, and intrusion detection systems. Currently, most vendors use Ternary Cont...
Yan Sun, Min Sik Kim
IV
2002
IEEE
114views Visualization» more  IV 2002»
13 years 10 months ago
Tudumi: Information Visualization System for Monitoring and Auditing Computer Logs
Computer security breaches are already a major problem in using computers. The most basic defense against it is to monitor and audit the computer logs. Computer logs, however, hav...
Tetsuji Takada, Hideki Koike
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
13 years 9 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
ICON
2007
IEEE
14 years 2 days ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...