Sciweavers

1804 search results - page 145 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
IPPS
2010
IEEE
15 years 2 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
ICPR
2008
IEEE
15 years 10 months ago
Automatic face and facial features initialization for robust and accurate tracking
Face detection and tracking, through image sequences, are primary steps in many applications such as video surveillance, human computer interface, and expression analysis. Many cu...
Murad Al Haj, Javier Orozco, Jordi Gonzàlez...
USENIX
2008
15 years 6 months ago
Context-Aware Prefetching at the Storage Server
In many of today's applications, access to storage constitutes the major cost of processing a user request. Data prefetching has been used to alleviate the storage access lat...
Gokul Soundararajan, Madalin Mihailescu, Cristiana...
ICDM
2009
IEEE
148views Data Mining» more  ICDM 2009»
15 years 11 months ago
Online System Problem Detection by Mining Patterns of Console Logs
Abstract—We describe a novel application of using data mining and statistical learning methods to automatically monitor and detect abnormal execution traces from console logs in ...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...
CN
2007
91views more  CN 2007»
15 years 4 months ago
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net
Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next lik...
Dong Yu, Deborah A. Frincke