Sciweavers

733 search results - page 32 / 147
» Formal Reasoning About Intrusion Detection Systems
Sort
View
IJNSEC
2006
132views more  IJNSEC 2006»
15 years 1 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
SP
1997
IEEE
130views Security Privacy» more  SP 1997»
15 years 6 months ago
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
This paper describes a specification-based approach to detect exploitations of vulnerabdities in securitycritical programs. The approach utilizes security specifications that desc...
Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
ICSE
1994
IEEE-ACM
15 years 6 months ago
Applying Formal Methods for Human Error Tolerant Design
Abstract. This paper describes recent work concerned with the speci cation of requirements on interactive systems and the de nition of user-level properties of such systems. A form...
Bob Fields, Peter C. Wright, Michael D. Harrison
ATAL
2007
Springer
15 years 8 months ago
Matrix-based representation for coordination fault detection: a formal approach
Teamwork requires that team members coordinate their actions. The representation of the coordination is a key requirement since it influences the complexity and flexibility of r...
Meir Kalech, Michael Lindner, Gal A. Kaminka
ISMIS
2005
Springer
15 years 7 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...