Sciweavers

765 search results - page 110 / 153
» Detecting Anomalies and Intruders
Sort
View
ICARIS
2007
Springer
15 years 6 months ago
An Artificial Immune System-Inspired Multiobjective Evolutionary Algorithm with Application to the Detection of Distributed Comp
Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
IJISEC
2006
119views more  IJISEC 2006»
14 years 12 months ago
A monitoring system for detecting repeated packets with applications to computer worms
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
IEICET
2007
142views more  IEICET 2007»
14 years 11 months ago
Detecting Unknown Worms Using Randomness Check
From the appearance of CodeRed and SQL Slammer worm, we have learned that the early detection of worm epidemics is important to reduce the damage caused by their outbreak. One prom...
Hyundo Park, Heejo Lee, Hyogon Kim
ICDM
2010
IEEE
216views Data Mining» more  ICDM 2010»
14 years 10 months ago
Data Editing Techniques to Allow the Application of Distance-Based Outlier Detection to Streams
The problem of finding outliers in data has broad applications in areas as diverse as data cleaning, fraud detection, network monitoring, invasive species monitoring, etc. While th...
Vit Niennattrakul, Eamonn J. Keogh, Chotirat Ann R...
WWW
2009
ACM
16 years 17 days ago
Towards lightweight and efficient DDOS attacks detection for web server
In this poster, based on our previous work in building a lightweight DDoS (Distributed Denial-of-Services) attacks detection mechanism for web server using TCM-KNN (Transductive C...
Li Guo, Qin-Wu Nie, Tianbo Lu, Yang Li, Zhihong Ti...