Sciweavers

336 search results - page 9 / 68
» Immune System Approaches to Intrusion Detection - A Review
Sort
View
COMCOM
2002
143views more  COMCOM 2002»
14 years 9 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt
ICDCS
2006
IEEE
15 years 3 months ago
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks
Global-scale attacks like viruses and worms are increasing in frequency, severity and sophistication, making it critical to detect outbursts at routers/gateways instead of end hos...
Yan Gao, Zhichun Li, Yan Chen
GECCO
1999
Springer
15 years 1 months ago
An Immune System Approach to Scheduling in Changing Environments
This paper describes the application of an arti cial immune system, AIS, model to a scheduling application, in which sudden changes in the scheduling environment require the rap...
Emma Hart, Peter Ross
SP
1996
IEEE
100views Security Privacy» more  SP 1996»
15 years 1 months ago
A Sense of Self for Unix Processes
A method for anomaly detection is introduced in which "normal" is defined by short-range correlations in a process' system calls. Initial experiments suggest that t...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
96
Voted
JAIHC
2010
205views more  JAIHC 2010»
14 years 8 months ago
Soft computing in intrusion detection: the state of the art
The state of the art is explored in using soft computing (SC) methods for network intrusion detection, including the examination of efforts in ten specific areas of SC as well as ...
Chet Langin, Shahram Rahimi