Sciweavers

2269 search results - page 55 / 454
» Behavioral Intrusion Detection
Sort
View
165
Voted
CN
1999
128views more  CN 1999»
15 years 3 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
123
Voted
IJNSEC
2007
171views more  IJNSEC 2007»
15 years 3 months ago
Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor net...
Afrand Agah, Sajal K. Das
124
Voted
CCS
2007
ACM
15 years 9 months ago
Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention
Stateful, in-depth, inline traffic analysis for intrusion detection and prevention is growing increasingly more difficult as the data rates of modern networks rise. Yet it remai...
José M. González, Vern Paxson, Nicho...
CCS
2009
ACM
16 years 4 months ago
Intrusion response cost assessment methodology
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...
93
Voted
RAID
1999
Springer
15 years 7 months ago
Intrusion Detection Mechanism to Detect Reachability Attacks in PNNI Networks
Yves Cosendai, Marc Dacier, Paolo Scotton