Sciweavers

16 search results - page 3 / 4
» HoneyStat: Local Worm Detection Using Honeypots
Sort
View
NDSS
2005
IEEE
15 years 3 months ago
Enriching Intrusion Alerts Through Multi-Host Causality
Current intrusion detection systems point out suspicious states or events but do not show how the suspicious state or events relate to other states or events in the system. We sho...
Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lu...
81
Voted
IWSOS
2007
Springer
15 years 3 months ago
Collaborative Anomaly-Based Attack Detection
Today networks suffer from various challenges like distributed denial of service attacks or worms. Multiple different anomaly-based detection systems try to detect and counter such...
Thomas Gamer, Michael Scharf, Marcus Schöller
81
Voted
RAID
2004
Springer
15 years 2 months ago
Seurat: A Pointillist Approach to Anomaly Detection
Abstract. This paper proposes a new approach to detecting aggregated anomalous events by correlating host file system changes across space and time. Our approach is based on a key...
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, M...
IMC
2004
ACM
15 years 3 months ago
Characteristics of internet background radiation
Monitoring any portion of the Internet address space reveals incessant activity. This holds even when monitoring traffic sent to unused addresses, which we term “background rad...
Ruoming Pang, Vinod Yegneswaran, Paul Barford, Ver...
94
Voted
BMCBI
2010
161views more  BMCBI 2010»
14 years 9 months ago
FRASS: the web-server for RNA structural comparison
Background: The impressive increase of novel RNA structures, during the past few years, demands automated methods for structure comparison. While many algorithms handle only small...
Svetlana Kirillova, Silvio C. E. Tosatto, Oliviero...