134
click to vote
RAID
15 years 7 months ago
2004 Springer
This paper provides an examination of an emerging class of security mechanisms often referred to as deception technologies or honeypots. It is based on our experience over the last...
127
Voted
RAID
15 years 7 months ago
2004 Springer
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
103
click to vote
RAID
15 years 7 months ago
2004 Springer
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
123
Voted
RAID
15 years 7 months ago
2004 Springer
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
116
Voted
RAID
15 years 7 months ago
2004 Springer
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
|