Sciweavers

256 search results - page 11 / 52
» CARDS: A Distributed System for Detecting Coordinated Attack...
Sort
View
IWSOS
2007
Springer
15 years 3 months ago
Collaborative Anomaly-Based Attack Detection
Today networks suffer from various challenges like distributed denial of service attacks or worms. Multiple different anomaly-based detection systems try to detect and counter such...
Thomas Gamer, Michael Scharf, Marcus Schöller
DSN
2008
IEEE
15 years 3 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
FGCN
2008
IEEE
175views Communications» more  FGCN 2008»
15 years 3 months ago
Safeguard Intranet Using Embedded and Distributed Firewall System
Due to the impact of the rapid popularization of Internet and e-commerce, most organizations and enterprises take great effort to protect their information systems against malicio...
Chu-Hsing Lin, Jung-Chun Liu, Chien-Ting Kuo, Mei-...
66
Voted
AICCSA
2005
IEEE
105views Hardware» more  AICCSA 2005»
15 years 3 months ago
Multivariate statistical analysis for network attacks detection
Detection and self-protection against viruses, worms, and network attacks is urgently needed to protect network systems and their applications from catastrophic failures. Once a n...
Guangzhi Qu, Salim Hariri, Mazin S. Yousif
ICPPW
2002
IEEE
15 years 2 months ago
A Structural Framework for Modeling Multi-Stage Network Attacks
Incidents such as Solar Sunrise and Nimda demonstrate the need to expressively model distributed and complex network attacks. To protect information systems, system administrators...
Kristopher Daley, Ryan Larson, Jerald Dawkins