Sciweavers

198 search results - page 27 / 40
» Exploiting Independent State For Network Intrusion Detection
Sort
View
95
Voted
AVSS
2007
IEEE
15 years 10 months ago
CASSANDRA: audio-video sensor fusion for aggression detection
This paper presents a smart surveillance system named CASSANDRA, aimed at detecting instances of aggressive human behavior in public environments. A distinguishing aspect of CASSA...
Wojtek Zajdel, Johannes D. Krijnders, Tjeerd C. An...
ICCD
2008
IEEE
136views Hardware» more  ICCD 2008»
16 years 14 days ago
A resource efficient content inspection system for next generation Smart NICs
— The aggregate power consumption of the Internet is increasing at an alarming rate, due in part to the rapid increase in the number of connected edge devices such as desktop PCs...
Karthik Sabhanatarajan, Ann Gordon-Ross
111
Voted
SIGCOMM
2010
ACM
15 years 3 months ago
ASTUTE: detecting a different class of traffic anomalies
When many flows are multiplexed on a non-saturated link, their volume changes over short timescales tend to cancel each other out, making the average change across flows close to ...
Fernando Silveira, Christophe Diot, Nina Taft, Ram...
INFOCOM
2010
IEEE
15 years 2 months ago
Scalable NIDS via Negative Pattern Matching and Exclusive Pattern Matching
i In this paper, we identify the unique challenges in deploying parallelism on TCAM-based pattern matching for Network Intrusion Detection Systems (NIDSes). We resolve two critica...
Kai Zheng, Xin Zhang, Zhiping Cai, Zhijun Wang, Ba...
145
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 10 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto