Sciweavers

765 search results - page 4 / 153
» Detecting Anomalies and Intruders
Sort
View
SPIN
2012
Springer
13 years 11 hour ago
Counterexample Explanation by Anomaly Detection
Since counterexamples generated by model checking tools are only symptoms of faults in the model, a significant amount of manual work is required in order to locate the fault that...
Stefan Leue, Mitra Tabaei Befrouei
IEEEIAS
2009
IEEE
15 years 4 months ago
Detecting Stepping-Stone Intruders with Long Connection Chains
: A common technique hacker use is to route their traffic through a chain of stepping-stone hosts. It is generally agreed that there is no valid reason to use a long connection cha...
Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephe...
CGA
2004
14 years 9 months ago
Detecting Flaws and Intruders with Visual Data Analysis
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, T. ...
ICCNMC
2005
Springer
15 years 3 months ago
Improved Thumbprint and Its Application for Intrusion Detection
This paper proposes RTT-thumbprint to traceback intruders, and to detect stepping-stone intrusion; RTT-thumbprint is a sequence of timestamp pairs of a send packet and its correspo...
Jianhua Yang, Shou-Hsuan Stephen Huang