Sciweavers

877 search results - page 100 / 176
» Intrusion detection systems as evidence
Sort
View
CCS
2003
ACM
15 years 7 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
102
Voted
DSOM
2007
Springer
15 years 8 months ago
Botnets for Scalable Management
With an increasing number of devices that must be managed, the scalability of network and service management is a real challenge. A similar challenge seems to be solved by botnets ...
Jérôme François, Radu State, O...
ACSAC
2006
IEEE
15 years 5 months ago
Offloading IDS Computation to the GPU
Signature-matching Intrusion Detection Systems can experience significant decreases in performance when the load on the IDS-host increases. We propose a solution that off-loads so...
Nigel Jacob, Carla E. Brodley
IJISEC
2008
188views more  IJISEC 2008»
15 years 14 days ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
CN
2007
168views more  CN 2007»
15 years 1 months ago
Network anomaly detection with incomplete audit data
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
Animesh Patcha, Jung-Min Park