Sciweavers

2587 search results - page 26 / 518
» Intrusion Tolerant Systems
Sort
View
DMIN
2006
141views Data Mining» more  DMIN 2006»
15 years 3 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov
EUROPAR
2004
Springer
15 years 5 months ago
Overhead Compensation in Performance Profiling
Measurement-based profiling introduces intrusion in program execution. Intrusion effects can be mitigated by compensating for measurement overhead. Techniques for compensation anal...
Allen D. Malony, Sameer Shende
JSS
2002
198views more  JSS 2002»
15 years 1 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
RSFDGRC
2005
Springer
156views Data Mining» more  RSFDGRC 2005»
15 years 7 months ago
Intrusion Detection System Based on Multi-class SVM
In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Hansung Lee, Jiyoung Song, Daihee Park
IWDC
2004
Springer
156views Communications» more  IWDC 2004»
15 years 7 months ago
Agent-Based Distributed Intrusion Alert System
Intrusion detection for computer systems is a key problem in today’s networked society. Current distributed intrusion detection systems (IDSs) are not fully distributed as most o...
Arjita Ghosh, Sandip Sen