Sciweavers

3785 search results - page 133 / 757
» Immune System Based Intrusion Detection System
Sort
View
148
Voted
HICSS
2006
IEEE
261views Biometrics» more  HICSS 2006»
15 years 10 months ago
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks
: e-business organizations are heavily dependent on distributed 24X7 robust information computing systems, for their daily operations. To secure distributed online transactions, th...
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis ...
148
Voted
INFOCOM
2012
IEEE
13 years 7 months ago
Stochastic analysis of horizontal IP scanning
—Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers...
Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri...
ACSAC
2007
IEEE
15 years 8 months ago
Efficiency Issues of Rete-Based Expert Systems for Misuse Detection
This paper provides a general and comprehensive approach to implementing misuse detection on expert systems and an in-depth analysis of the effectiveness of the optimization strat...
Michael Meier, Ulrich Flegel, Sebastian Schmerl
220
Voted
DIMVA
2011
14 years 8 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 10 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...