Sciweavers

319 search results - page 3 / 64
» A Compound Intrusion Detection Model
Sort
View
97
Voted
ISCIS
2004
Springer
15 years 5 months ago
Behavioral Intrusion Detection
Abstract. In this paper we describe anomaly-based intrusion detection as a specialized case of the more general behavior detection problem. We draw concepts from the field of etho...
Stefano Zanero
94
Voted
ACSAC
2003
IEEE
15 years 5 months ago
Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model
In [1], we proposed a model for policy-based intrusion detection, based on information flow control. In the present paper, we show its applicability and effectiveness on a stand...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...
136
Voted
IEEEARES
2006
IEEE
15 years 6 months ago
Identifying Intrusions in Computer Networks with Principal Component Analysis
Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Wei Wang, Roberto Battiti
ECBS
2007
IEEE
161views Hardware» more  ECBS 2007»
15 years 2 months ago
Alert Fusion for a Computer Host Based Intrusion Detection System
Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
92
Voted
DSOM
2008
Springer
15 years 2 months ago
Trust Management for Host-Based Collaborative Intrusion Detection
The accuracy of detecting an intrusion within a network of intrusion detection systems (IDSes) depends on the efficiency of collaboration between member IDSes. The security itself ...
Carol J. Fung, Olga Baysal, Jie Zhang, Issam Aib, ...