Sciweavers

2587 search results - page 13 / 518
» Intrusion Tolerant Systems
Sort
View
DMIN
2006
123views Data Mining» more  DMIN 2006»
15 years 3 months ago
Novel Evaluation Framework of Intrusion Detection Systems with Respect to Security Policies
Intrusion Detection System is an integral component of the computer security infrastructure. It is usually put in place to detect computer security policy violations. While its ro...
Negmat Mullodzhanov
139
Voted
ACSAC
2010
IEEE
14 years 12 months ago
Network intrusion detection: dead or alive?
Research on network intrusion detection has produced a number of interesting results. In this paper, I look back to the NetSTAT system, which was presented at ACSAC in 1998. In ad...
Giovanni Vigna
CNSR
2005
IEEE
112views Communications» more  CNSR 2005»
15 years 7 months ago
Generating Representative Traffic for Intrusion Detection System Benchmarking
In this paper, a modeling and simulation framework is proposed for generating data for training and testing intrusion detection systems. The framework can develop models of web us...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
105
Voted
IEEEIAS
2008
IEEE
15 years 8 months ago
Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything...
Václav Snásel, Jan Platos, Pavel Kr&...
COMCOM
2002
143views more  COMCOM 2002»
15 years 1 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt