Sciweavers

877 search results - page 104 / 176
» Intrusion detection systems as evidence
Sort
View
HICSS
2003
IEEE
220views Biometrics» more  HICSS 2003»
15 years 7 months ago
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
CNSR
2008
IEEE
126views Communications» more  CNSR 2008»
15 years 8 months ago
Distributed Exchange of Alerts for the Detection of Coordinated Attacks
Attacks and intrusions to information systems cause large revenue losses. The prevention of these attacks is not always possible by just considering information from isolated sour...
Joaquín García-Alfaro, Michael A. Ja...
RAID
2004
Springer
15 years 7 months ago
On the Design and Use of Internet Sinks for Network Abuse Monitoring
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
Vinod Yegneswaran, Paul Barford, David Plonka
RAID
2005
Springer
15 years 7 months ago
FLIPS: Hybrid Adaptive Intrusion Prevention
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...
ECAL
2007
Springer
15 years 8 months ago
Detecting Non-trivial Computation in Complex Dynamics
Abstract. We quantify the local information dynamics at each spatiotemporal point in a complex system in terms of each element of computation: information storage, transfer and mod...
Joseph T. Lizier, Mikhail Prokopenko, Albert Y. Zo...