Sciweavers

2269 search results - page 78 / 454
» Behavioral Intrusion Detection
Sort
View
114
Voted
ICIP
2008
IEEE
16 years 2 months ago
Motion segmentation and abnormal behavior detection via behavior clustering
We consider a change detection problem in video surveillance applications and propose busy-idle rates, meaningful and easy to compute features, to characterize the behavior profil...
Erhan Baki Ermis, Venkatesh Saligrama, Pierre-Marc...
79
Voted
ACSAC
2003
IEEE
15 years 6 months ago
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS
Over the past decade, Intrusion Detection Systems (IDS) have improved steadily in the efficiency and effectiveness with which they detect intrusive activity. This is particularly ...
Nathan Carey, George M. Mohay, Andrew Clark
125
Voted
TIFS
2008
154views more  TIFS 2008»
15 years 15 days ago
Data Fusion and Cost Minimization for Intrusion Detection
Abstract--Statistical pattern recognition techniques have recently been shown to provide a finer balance between misdetections and false alarms than the more conventional intrusion...
Devi Parikh, Tsuhan Chen
CCS
2011
ACM
14 years 18 days ago
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Giorgos Vasiliadis, Michalis Polychronakis, Sotiri...
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
15 years 4 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...