Sciweavers

452 search results - page 9 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
KBSE
2005
IEEE
15 years 3 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
CORR
2010
Springer
160views Education» more  CORR 2010»
14 years 9 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...
EUROSYS
2009
ACM
15 years 6 months ago
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
Babak Salamat, Todd Jackson, Andreas Gal, Michael ...
RAID
2005
Springer
15 years 3 months ago
COTS Diversity Based Intrusion Detection and Application to Web Servers
Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
Eric Totel, Frédéric Majorczyk, Ludo...
110
Voted
ICC
2009
IEEE
164views Communications» more  ICC 2009»
14 years 7 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...