Sciweavers

2269 search results - page 20 / 454
» Behavioral Intrusion Detection
Sort
View
103
Voted
TNC
2004
120views Education» more  TNC 2004»
15 years 1 months ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
109
Voted
ACSAC
2004
IEEE
15 years 4 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
COMCOM
2002
143views more  COMCOM 2002»
15 years 7 days ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt
144
Voted
IAJIT
2010
190views more  IAJIT 2010»
14 years 11 months ago
Framework for intrusion detection in IEEE 802.11 wireless mesh networks
: Intrusion detection system is one of the possible solutions to timely detect the intrusions and alarm for appropriate action. So far many intrusion detection systems have been pr...
Shafiullah Khan, Kok-Keong Loo, Zia Ud Din
130
Voted
CSFW
2004
IEEE
15 years 4 months ago
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework
Since current computer infrastructures are increasingly vulnerable to malicious activities, intrusion detection is necessary but unfortunately not sufficient. We need to design ef...
Frédéric Cuppens, Sylvain Gombault, ...