Sciweavers

412 search results - page 32 / 83
» Intrusion Detection for an On-Going Attack
Sort
View
ITNG
2010
IEEE
14 years 10 months ago
Scalable Intrusion Detection with Recurrent Neural Networks
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
DSS
2000
107views more  DSS 2000»
14 years 11 months ago
MarketNet: protecting access to information systems through financial market controls
This paper describes novel market-based technologies that uniquely establish quantifiable and adjustable limits on the power of attackers, enable verifiable accountability for mal...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
CORR
2008
Springer
118views Education» more  CORR 2008»
14 years 12 months ago
Strategic Alert Throttling for Intrusion Detection Systems
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
Gianni Tedesco, Uwe Aickelin
ACSAC
2004
IEEE
15 years 3 months ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson
IMC
2004
ACM
15 years 5 months ago
On scalable attack detection in the network
Current intrusion detection and prevention systems seek to detect a wide class of network intrusions (e.g., DoS attacks, worms, port scans) at network vantage points. Unfortunatel...
Ramana Rao Kompella, Sumeet Singh, George Varghese