Sciweavers

1804 search results - page 62 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
SEC
1996
14 years 11 months ago
Intention modelling: approximating computer user intentions for detection and prediction of intrusions
This paper introduces and describes an innovative modelling approach which utilises models that are synthesised through approximate calculations of user actions and extensive repr...
Thomas Spyrou, John Darzentas
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
15 years 3 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie
IWIA
2006
IEEE
15 years 4 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock
CNSR
2008
IEEE
169views Communications» more  CNSR 2008»
15 years 4 months ago
Critical Episode Mining in Intrusion Detection Alerts
One of the most important steps in attack detection using Intrusion Detection Systems (IDSs) is dealing with huge number of alerts that can be either critical single alerts and mu...
Mahboobeh Soleimani, Ali A. Ghorbani
EUROPAR
2006
Springer
15 years 1 months ago
Supporting a Real-Time Distributed Intrusion Detection Application on GATES
Increasingly, a number of applications across computer sciences and other science and engineering disciplines rely on, or can potentially benefit from, analysis and monitoring of d...
Qian Zhu, Liang Chen, Gagan Agrawal