Sciweavers

2269 search results - page 77 / 454
» Behavioral Intrusion Detection
Sort
View
91
Voted
IWIA
2006
IEEE
15 years 6 months ago
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System
We present POSEIDON, a new anomaly-based network intrusion detection system. POSEIDON is payload-based, and has a two-tier architecture: the first stage consists of a Self-Organi...
Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, ...
PST
2004
15 years 2 months ago
A Declarative Approach to Stateful Intrusion Detection and Network Monitoring
In this paper we present a new approach to stateful intrusion detection. It is based on a temporal logic which has the capability to express temporary properties, which are propert...
Mathieu Couture, Béchir Ktari, Mohamed Mejr...
EVOW
2009
Springer
14 years 10 months ago
Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming
An ever-present problem in intrusion detection technology is how to construct the patterns of (good, bad or anomalous) behaviour upon which an engine have to make decisions regardi...
Agustín Orfila, Juan M. Estévez-Tapi...
CCR
2004
94views more  CCR 2004»
15 years 14 days ago
Honeycomb: creating intrusion detection signatures using honeypots
Abstract-- This paper describes a system for automated generation of attack signatures for network intrusion detection systems. Our system applies pattern-matching techniques and p...
Christian Kreibich, Jon Crowcroft
IAT
2007
IEEE
15 years 4 months ago
High-Speed Network Traffic Acquisition for Agent Systems
This paper presents a design of high-speed network traffic acquisition subsystem suitable for agent-based intrusion detection systems. To match the performance requirements and to...
Pavel Celeda, Vojtech Krmicek, Martin Rehák...