Sciweavers

ACSAC
2004
IEEE
15 years 8 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
ACSAC
2004
IEEE
15 years 8 months ago
Alert Correlation through Triggering Events and Common Resources
Complementary security systems are widely deployed in networks to protect digital assets. Alert correlation is essential to understanding the security threats and taking appropria...
Dingbang Xu, Peng Ning
ACSAC
2004
IEEE
15 years 8 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
ACSAC
2004
IEEE
15 years 8 months ago
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic
Combining an "anomaly" and a "misuse" IDSes offers the advantage of separating the monitored events between normal, intrusive or unqualified classes (ie not kn...
Elvis Tombini, Hervé Debar, Ludovic M&eacut...
ACSAC
2004
IEEE
15 years 8 months ago
Towards Secure Design Choices for Implementing Graphical Passwords
We study the impact of selected parameters on the size of the password space for "Draw-A-Secret" (DAS) graphical passwords. We examine the role of and relationships betw...
Julie Thorpe, Paul C. van Oorschot