Sciweavers

765 search results - page 109 / 153
» Detecting Anomalies and Intruders
Sort
View
CN
2007
106views more  CN 2007»
14 years 12 months ago
Learning DFA representations of HTTP for protecting web applications
Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
SISW
2003
IEEE
15 years 5 months ago
Fast and Secure Magnetic WORM Storage Systems
Computer forensic analysis, intrusion detection and disaster recovery are all dependent on the existence of trustworthy log files. Current storage systems for such log files are...
Yongge Wang, Yuliang Zheng
ICDE
2005
IEEE
161views Database» more  ICDE 2005»
16 years 1 months ago
Network-Based Problem Detection for Distributed Systems
We introduce a network-based problem detection framework for distributed systems, which includes a data-mining method for discovering dynamic dependencies among distributed servic...
Hisashi Kashima, Tadashi Tsumura, Tsuyoshi Id&eacu...
AINA
2007
IEEE
15 years 6 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
GECCO
2007
Springer
149views Optimization» more  GECCO 2007»
15 years 6 months ago
Dendritic cells for SYN scan detection
Artificial immune systems have previously been applied to the problem of intrusion detection. The aim of this research is to develop an intrusion detection system based on the fu...
Julie Greensmith, Uwe Aickelin