Sciweavers

273 search results - page 30 / 55
» An immunity-based technique to characterize intrusions in co...
Sort
View
VIZSEC
2005
Springer
15 years 5 months ago
IDS RainStorm: Visualizing IDS Alarms
The massive amount of alarm data generated from intrusion detection systems is cumbersome for network system administrators to analyze. Often, important details are overlooked and...
Kulsoom Abdullah, Christopher P. Lee, Gregory J. C...
DAC
2007
ACM
16 years 22 days ago
Compact State Machines for High Performance Pattern Matching
Pattern matching is essential to a wide range of applications such as network intrusion detection, virus scanning, etc. Pattern matching algorithms normally rely on state machines...
Piti Piyachon, Yan Luo
CCS
2003
ACM
15 years 5 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
ICDM
2006
IEEE
102views Data Mining» more  ICDM 2006»
15 years 5 months ago
Who Thinks Who Knows Who? Socio-cognitive Analysis of Email Networks
Interpersonal interaction plays an important role in organizational dynamics, and understanding these interaction networks is a key issue for any organization, since these can be ...
Nishith Pathak, Sandeep Mane, Jaideep Srivastava
109
Voted
NDSS
2009
IEEE
15 years 6 months ago
RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to r...
Amir Houmansadr, Negar Kiyavash, Nikita Borisov