Sciweavers

877 search results - page 52 / 176
» Intrusion detection systems as evidence
Sort
View
LISA
2004
15 years 3 months ago
I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System
Swapnil Patil, Anand Kashyap, Gopalan Sivathanu, E...
HPCC
2007
Springer
15 years 8 months ago
Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections
As Grids become increasingly relied upon as critical infrastructure, it is imperative to ensure the highly-available and secure day-to-day operation of the Grid infrastructure. The...
Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill,...
SOSP
2005
ACM
15 years 10 months ago
Detecting past and present intrusions through vulnerability-specific predicates
Ashlesha Joshi, Samuel T. King, George W. Dunlap, ...
134
Voted
JSAC
2006
163views more  JSAC 2006»
15 years 1 months ago
Fast and Scalable Pattern Matching for Network Intrusion Detection Systems
High-speed packet content inspection and filtering devices rely on a fast multi-pattern matching algorithm which is used to detect predefined keywords or signatures in the packets....
Sarang Dharmapurikar, John W. Lockwood
LISA
2007
15 years 4 months ago
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems
We present an architecture1 designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and a...
Damiano Bolzoni, Bruno Crispo, Sandro Etalle