Sciweavers

3785 search results - page 130 / 757
» Immune System Based Intrusion Detection System
Sort
View
IJDE
2007
105views more  IJDE 2007»
15 years 4 months ago
Rigorous Development of Automated Inconsistency Checks for Digital Evidence Using the B Method
Inconsistencies in various data structures, such as missing log records and modified operating system files, have long been used by intrusion investigators and forensic analysts a...
Pavel Gladyshev, Andreas Enbacka
CCS
2006
ACM
15 years 8 months ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee
122
Voted
INFOCOM
2006
IEEE
15 years 10 months ago
Contribution of Anomalies Detection and Analysis on Traffic Engineering
—In this paper we present a methodology for detecting traffic anomalies. To accomplish that, and as a demarcation from similar works, we combine multi-scale and multi-criteria an...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
MADNES
2005
Springer
15 years 10 months ago
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis
RAID
2004
Springer
15 years 10 months ago
On the Design and Use of Internet Sinks for Network Abuse Monitoring
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
Vinod Yegneswaran, Paul Barford, David Plonka