Sciweavers

336 search results - page 17 / 68
» Immune System Approaches to Intrusion Detection - A Review
Sort
View
JSS
2002
198views more  JSS 2002»
14 years 11 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
15 years 5 months ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich
ICARIS
2003
Springer
15 years 5 months ago
Signal Processing by an Immune Type Tree Transform
Abstract. The paper makes an attempt to introduce a new approach for detection of local singularities in signals, including one-dimensional time series and two-dimensional images. ...
Nikolaos D. Atreas, Costas G. Karanikas, Alexander...
ACSAC
2003
IEEE
15 years 5 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
16 years 8 days ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier