Sciweavers

201 search results - page 13 / 41
» Detecting Intrusions using System Calls: Alternative Data Mo...
Sort
View
TNC
2004
120views Education» more  TNC 2004»
15 years 11 days ago
Realtime Intrusion-Forensics: A First Prototype Implementation (based on a stack-based NIDS)
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...
Udo Payer
ICC
2009
IEEE
123views Communications» more  ICC 2009»
15 years 5 months ago
Combining Hidden Markov Models for Improved Anomaly Detection
—In host-based intrusion detection systems (HIDS), anomaly detection involves monitoring for significant deviations from normal system behavior. Hidden Markov Models (HMMs) have...
Wael Khreich, Eric Granger, Robert Sabourin, Ali M...
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
15 years 1 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 4 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 4 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala