Sciweavers

412 search results - page 68 / 83
» Intrusion Detection for an On-Going Attack
Sort
View
ACSAC
2005
IEEE
15 years 3 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
DAGSTUHL
2006
14 years 11 months ago
SANA - Security Analysis in Internet Traffic through Artificial Immune Systems
The Attacks done by Viruses, Worms, Hackers, etc. are a Network Security-Problem in many Organisations. Current Intrusion Detection Systems have significant Disadvantages, e.g. the...
Michael Hilker, Christoph Schommer
CCS
2008
ACM
14 years 11 months ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
CCN
2006
278views Communications» more  CCN 2006»
14 years 11 months ago
Detecting rogue devices in bluetooth networks using radio frequency fingerprinting
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
Jeyanthi Hall, Michel Barbeau, Evangelos Kranakis
INCDM
2010
Springer
159views Data Mining» more  INCDM 2010»
15 years 2 months ago
Semi-supervised Learning for False Alarm Reduction
Abstract. Intrusion Detection Systems (IDSs) which have been deployed in computer networks to detect a wide variety of attacks are suffering how to manage of a large number of tri...
Chien-Yi Chiu, Yuh-Jye Lee, Chien-Chung Chang, Wen...