Sciweavers

452 search results - page 13 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
95
Voted
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
14 years 11 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
JCS
2002
115views more  JCS 2002»
14 years 9 months ago
Panoptis: Intrusion Detection Using a Domain-Specific Language
We describe the use of a domain-specific language (DSL) for expressing critical design values and constraints in an intrusion detection application. Through the use of this specia...
Diomidis Spinellis, Dimitris Gritzalis
MATA
2004
Springer
189views Communications» more  MATA 2004»
15 years 3 months ago
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...
CF
2005
ACM
14 years 11 months ago
SPANIDS: a scalable network intrusion detection loadbalancer
Network intrusion detection systems (NIDS) are becoming an increasingly important security measure. With rapidly increasing network speeds, the capacity of the NIDS sensor can lim...
Lambert Schaelicke, Kyle Wheeler, Curt Freeland
70
Voted
CCS
2009
ACM
15 years 10 months ago
Intrusion response cost assessment methodology
In this paper we present a structured methodology for evaluating cost of responses based on three factors: the response operational cost associated with the daily maintenance of t...
Chris Strasburg, Natalia Stakhanova, Samik Basu, J...