Sciweavers

3785 search results - page 123 / 757
» Immune System Based Intrusion Detection System
Sort
View
SRDS
2006
IEEE
15 years 10 months ago
Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available
In a recent paper, we presented proactive resilience as a new approach to proactive recovery, based on architectural hybridization. We showed that, with appropriate assumptions ab...
Paulo Sousa, Nuno Ferreira Neves, Paulo Verí...
SP
2008
IEEE
187views Security Privacy» more  SP 2008»
15 years 4 months ago
Efficient and Robust TCP Stream Normalization
Network intrusion detection and prevention systems are vulnerable to evasion by attackers who craft ambiguous traffic to breach the defense of such systems. A normalizer is an inl...
Mythili Vutukuru, Hari Balakrishnan, Vern Paxson
DIMVA
2009
15 years 5 months ago
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
Abstract. Many systems have been introduced to detect software intrusions by comparing the outputs and behavior of diverse replicas when they are processing the same, potentially m...
Jin Han, Debin Gao, Robert H. Deng
110
Voted
HICSS
2007
IEEE
112views Biometrics» more  HICSS 2007»
15 years 11 months ago
E-Risk Management through Self Insurance: An Option Model
e-business organizations are under constant threat of their business being disrupted by hackers, viruses and a host of malicious attackers. This would lead to loses to the tune of...
Arunabha Mukhopadhyay, Binay Bhushan, Debashis Sah...
117
Voted
NDSS
2005
IEEE
15 years 10 months ago
Enriching Intrusion Alerts Through Multi-Host Causality
Current intrusion detection systems point out suspicious states or events but do not show how the suspicious state or events relate to other states or events in the system. We sho...
Samuel T. King, Zhuoqing Morley Mao, Dominic G. Lu...