Sciweavers

205 search results - page 17 / 41
» Foundations for Intrusion Prevention
Sort
View
RAID
2009
Springer
15 years 4 months ago
Multi-byte Regular Expression Matching with Speculation
Intrusion prevention systems determine whether incoming traffic matches a database of signatures, where each signature in the database represents an attack or a vulnerability. IPSs...
Daniel Luchaup, Randy Smith, Cristian Estan, Somes...
109
Voted
WSE
2006
IEEE
15 years 3 months ago
Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today’s Int...
Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kotha...
ASIAMS
2008
IEEE
15 years 4 months ago
HiNFRA: Hierarchical Neuro-Fuzzy Learning for Online Risk Assessment
Our previous research illustrated the design of fuzzy logic based online risk assessment for Distributed Intrusion Prediction and Prevention Systems (DIPPS) [3]. Based on the DIPP...
Kjetil Haslum, Ajith Abraham, Svein J. Knapskog
ICRA
2007
IEEE
138views Robotics» more  ICRA 2007»
15 years 4 months ago
Barrier Coverage for Variable Bounded-Range Line-of-Sight Guards
Abstract— In this paper, we formalize the problem of barrier coverage, that is, the problem of preventing undetected intrusion in a particular region using robot sensors. We solv...
Stephen Kloder, Seth Hutchinson
71
Voted
SAC
2010
ACM
15 years 4 months ago
TokDoc: a self-healing web application firewall
The growing amount of web-based attacks poses a severe threat to the security of web applications. Signature-based detection techniques increasingly fail to cope with the variety ...
Tammo Krueger, Christian Gehl, Konrad Rieck, Pavel...