Sciweavers

10 search results - page 1 / 2
» Defending against network IDS evasion
Sort
View
69
Voted
RAID
1999
Springer
15 years 7 months ago
Defending against network IDS evasion
Vern Paxson
109
Voted
CCS
2007
ACM
15 years 9 months ago
On the infeasibility of modeling polymorphic shellcode
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
127
Voted
ML
2010
ACM
155views Machine Learning» more  ML 2010»
15 years 1 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
121
Voted
CONEXT
2007
ACM
15 years 6 months ago
Practical defenses against BGP prefix hijacking
Prefix hijacking, a misbehavior in which a misconfigured or malicious BGP router originates a route to an IP prefix it does not own, is becoming an increasingly serious security p...
Zheng Zhang, Ying Zhang, Y. Charlie Hu, Zhuoqing M...
163
Voted
ISSA
2008
15 years 4 months ago
Immune System Based Intrusion Detection System
The threats and intrusions in IT systems can basically be compared to human diseases with the difference that the human body has an effective way to deal with them, what still nee...
Christoph Ehret, Ulrich Ultes-Nitsche