Sciweavers

1291 search results - page 23 / 259
» Intrusion Detection for Distributed Applications
Sort
View
113
Voted
ICT
2004
Springer
181views Communications» more  ICT 2004»
15 years 5 months ago
Attack Evidence Detection, Recovery, and Signature Extraction with ADenoIdS
Abstract. This paper presents the ADenoIdS intrusion detection system (IDS). ADenoIdS takes some architectural inspiration from the human immune system and automates intrusion reco...
F. S. de Paula, P. L. de Geus
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
16 years 24 days ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...
108
Voted
VIZSEC
2005
Springer
15 years 5 months ago
IDGraphs: Intrusion Detection and Analysis Using Histographs
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...
110
Voted
DATAMINE
2006
164views more  DATAMINE 2006»
15 years 13 days ago
Fast Distributed Outlier Detection in Mixed-Attribute Data Sets
Efficiently detecting outliers or anomalies is an important problem in many areas of science, medicine and information technology. Applications range from data cleaning to clinica...
Matthew Eric Otey, Amol Ghoting, Srinivasan Partha...
CCGRID
2004
IEEE
15 years 4 months ago
Protection mechanisms for application service hosting platforms
The Application Service Hosting Platform (ASHP) has recently received tremendous attention from both industry and academia. An ASHP provides a shared highperformance infrastructur...
Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann