Sciweavers

231 search results - page 8 / 47
» A Host-Based Approach to Network Attack Chaining Analysis
Sort
View
CCS
2007
ACM
15 years 3 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
GECCO
2008
Springer
127views Optimization» more  GECCO 2008»
14 years 10 months ago
Denial of service detection and analysis using idiotypic networks paradigm
In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variab...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...
IJCNN
2000
IEEE
15 years 1 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady
99
Voted
JPDC
2006
253views more  JPDC 2006»
14 years 9 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
DCW
2000
Springer
15 years 1 months ago
Message Chains and Disjunct Paths for Increasing Communication Performance in Large Networks
Abstract. In this paper we propose a simple powerful method to increase communication performance in large networks such as the Internet. Our approach is based on the usage multipl...
Markus Wulff, Peter G. Kropf, Herwig Unger