Sciweavers

63 search results - page 2 / 13
» Visualization of Host Behavior for Network Security
Sort
View
RAID
2010
Springer
13 years 3 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
ACSAC
2008
IEEE
13 years 7 months ago
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
Vanessa Frías-Martínez, Salvatore J....
USENIX
1994
13 years 6 months ago
Secure Short-Cut Routing for Mobile IP
This paper describes the architecture and implementation of a mobile IP system. It allows mobile hosts to roam between cells implemented with 2-Mbps radio base stations, while mai...
Trevor Blackwell, Kee Chan, Koling Chang, Thomas C...
VIIP
2001
13 years 6 months ago
Visual Behavior Characterization for Intrusion Detection in Large Scale Systems
This work focuses on the visual representation of relations towards aiding the exploration and analysis of network intrusions. Fundamentally, the visual representations aid an ana...
Robert F. Erbacher
ACSAC
2009
IEEE
13 years 9 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...