Sciweavers

642 search results - page 67 / 129
» Detecting Spoofed Packets
Sort
View
ICITA
2005
IEEE
15 years 10 months ago
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
Oge Marques, Pierre Baillargeon
RAID
2005
Springer
15 years 10 months ago
Anomalous Payload-Based Worm Detection and Signature Generation
New features of the PAYL anomalous payload detection sensor are demonstrated to accurately detect and generate signatures for zero-day worms. Experimental evidence demonstrates tha...
Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo
175
Voted
IWIA
2006
IEEE
15 years 11 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
118
Voted
CCS
2004
ACM
15 years 10 months ago
Operational experiences with high-volume network intrusion detection
In large-scale environments, network intrusion detection systems (NIDSs) face extreme challenges with respect to traffic volume, traffic diversity, and resource management. Whil...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
IWIA
2003
IEEE
15 years 10 months ago
Designing a Framework for Active Worm Detection on Global Networks
Past active Internet worms have caused widespread damage. Knowing the connection characteristics of such a worm very early in its proliferation cycle might provide first responde...
Vincent Berk, George Bakos, Robert Morris