Sciweavers

776 search results - page 21 / 156
» An Application of Machine Learning to Network Intrusion Dete...
Sort
View
125
Voted
ICC
2009
IEEE
164views Communications» more  ICC 2009»
14 years 9 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
ITNG
2010
IEEE
14 years 10 months ago
Scalable Intrusion Detection with Recurrent Neural Networks
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
ISI
2006
Springer
14 years 11 months ago
An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks
Wide applications of Wireless Sensor Networks also make them more interesting to adversaries. WSNs' protocols are designed without security in mind so they are susceptible to ...
Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Youn...
PERCOM
2005
ACM
15 years 11 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
RAID
2005
Springer
15 years 5 months ago
FLIPS: Hybrid Adaptive Intrusion Prevention
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...