200
click to vote
RAID
15 years 10 months ago
2007 Springer
Much data access occurs via HTTP, which is becoming a universal transport protocol. Because of this, it has become a common exploit target and several HTTP specific IDSs have been...
146
click to vote
RAID
15 years 10 months ago
2007 Springer
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
126
click to vote
RAID
15 years 10 months ago
2007 Springer
Network-level emulation has recently been proposed as a method for the accurate detection of previously unknown polymorphic code injection attacks. In this paper, we extend network...
126
click to vote
RAID
15 years 10 months ago
2007 Springer
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
129
click to vote
RAID
15 years 10 months ago
2007 Springer
Abstract. In this work we present a NIDS cluster as a scalable solution for realizing high-performance, stateful network intrusion detection on commodity hardware. The design addre...
|