Sciweavers

198 search results - page 16 / 40
» Exploiting Independent State For Network Intrusion Detection
Sort
View
103
Voted
ACSAC
2006
IEEE
15 years 9 months ago
Backtracking Algorithmic Complexity Attacks against a NIDS
Network Intrusion Detection Systems (NIDS) have become crucial to securing modern networks. To be effective, a NIDS must be able to counter evasion attempts and operate at or near...
Randy Smith, Cristian Estan, Somesh Jha
141
Voted
JSW
2008
98views more  JSW 2008»
15 years 3 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
DAC
2007
ACM
16 years 4 months ago
Compact State Machines for High Performance Pattern Matching
Pattern matching is essential to a wide range of applications such as network intrusion detection, virus scanning, etc. Pattern matching algorithms normally rely on state machines...
Piti Piyachon, Yan Luo
143
Voted
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
15 years 9 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie
143
Voted
PVLDB
2010
117views more  PVLDB 2010»
15 years 1 months ago
Distance-Based Outlier Detection: Consolidation and Renewed Bearing
Detecting outliers in data is an important problem with interesting applications in a myriad of domains ranging from data cleaning to financial fraud detection and from network i...
Gustavo Henrique Orair, Carlos Teixeira, Ye Wang, ...