Sciweavers

2269 search results - page 178 / 454
» Behavioral Intrusion Detection
Sort
View
125
Voted
CN
2007
90views more  CN 2007»
15 years 4 months ago
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
As next-generation computer worms may spread within minutes to millions of hosts, protection via human intervention is no longer an option. We discuss the implementation of SweetB...
Georgios Portokalidis, Herbert Bos
IJIPT
2010
147views more  IJIPT 2010»
15 years 3 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
SIMULATION
2010
178views more  SIMULATION 2010»
14 years 11 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
146
Voted
IJNSEC
2008
113views more  IJNSEC 2008»
15 years 4 months ago
An Effective Anomaly Detection Method in SMTP Traffic
We investigate an effective and robust mechanism for detecting SMTP traffic anomaly. Our detection method cumulates the deviation of current delivering status from history behavio...
Hao Luo, Binxing Fang, Xiao-chun Yun, Zhi-Gang Wu
VTC
2007
IEEE
161views Communications» more  VTC 2007»
15 years 11 months ago
Evaluating Video Streaming Over GPRS/UMTS Networks: A Practical Case
— In this paper, we focus on analyzing video streaming service performance on real networks. We propose a non intrusive methodology based on mobile devices as clients, instead of...
Almudena Diaz-Zayas, Pedro Merino, Laura Panizo, A...