Sciweavers

2269 search results - page 209 / 454
» Behavioral Intrusion Detection
Sort
View
IJDE
2007
105views more  IJDE 2007»
15 years 5 months ago
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts a...
Pavel Gladyshev, Andreas Enbacka
CJ
2004
93views more  CJ 2004»
15 years 5 months ago
An Architecture for Kernel-Level Verification of Executables at Run Time
Digital signatures have been proposed by several researchers as a way of preventing execution of malicious code. In this paper we propose a general architecture for performing the...
Luigi Catuogno, Ivan Visconti
COMCOM
2007
106views more  COMCOM 2007»
15 years 5 months ago
An ontology description for SIP security flaws
— Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture c...
Dimitris Geneiatakis, Costas Lambrinoudakis
INFOCOM
2010
IEEE
15 years 3 months ago
High Performance Dictionary-Based String Matching for Deep Packet Inspection
—Dictionary-Based String Matching (DBSM) is used in network Deep Packet Inspection (DPI) applications virus scanning [1] and network intrusion detection [2]. We propose the Pipel...
Yi-Hua Edward Yang, Hoang Le, Viktor K. Prasanna
RV
2010
Springer
119views Hardware» more  RV 2010»
15 years 3 months ago
LarvaStat: Monitoring of Statistical Properties
Execution paths expose non-functional information such as system reliability and performance, which can be collected using runtime verification techniques. Statistics gathering an...
Christian Colombo, Andrew Gauci, Gordon J. Pace