Sciweavers

877 search results - page 133 / 176
» Intrusion detection systems as evidence
Sort
View
119
Voted
CIT
2004
Springer
15 years 7 months ago
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection
End-to-end congestion control algorithms in TCP are designed for a highly co-operative environment with the assumption that the end hosts voluntarily participate in it and obey th...
V. Anil Kumar, Dorgham Sisalem
DSN
2009
IEEE
15 years 8 months ago
Xprobe2++: Low volume remote network information gathering tool
Active operating system fingerprinting is the process of actively determining a target network system’s underlying operating system type and characteristics by probing the targ...
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, ...
RAID
1999
Springer
15 years 6 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
LISA
2008
15 years 4 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
ICECCS
2007
IEEE
95views Hardware» more  ICECCS 2007»
15 years 8 months ago
A Novel Approach to the Detection of Cheating in Multiplayer Online Games
— Modern online multiplayer games are complex heterogeneous distributed systems comprised of servers and untrusted clients, which are often engineered under considerable commerci...
Peter Laurens, Richard F. Paige, Phillip J. Brooke...