Sciweavers

2269 search results - page 52 / 454
» Behavioral Intrusion Detection
Sort
View
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
16 years 29 days ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
93
Voted
ACSAC
2001
IEEE
15 years 4 months ago
eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun Solaris
eXpert-BSM is a real time forward-reasoning expert system that analyzes Sun Solaris audit trails. Based on many years of intrusion detection research, eXpert-BSM's knowledge ...
Ulf Lindqvist, Phillip A. Porras
ECBS
2006
IEEE
119views Hardware» more  ECBS 2006»
15 years 2 months ago
A Hybrid Intrusion Detection and Visualization System
Network attacks have become the fundamental threat to today's largely interconnected computer systems. Unauthorized activities and unauthorized access account for a large pro...
Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit
97
Voted
NCA
2009
IEEE
15 years 7 months ago
From Auto-adaptive to Survivable and Self-Regenerative Systems
—This paper charts the course of adaptive behavior in intrusion tolerance, starting from pre-programmed and usercontrolled reactive adaptation to highly sophisticated autonomic a...
Michael Atighetchi, Partha Pratim Pal
124
Voted
DFN
2003
15 years 1 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König