Sciweavers

877 search results - page 70 / 176
» Intrusion detection systems as evidence
Sort
View
HICSS
2003
IEEE
118views Biometrics» more  HICSS 2003»
15 years 7 months ago
On-Line Intrusion Detection and Attack Prevention Using Diversity, Generate-and-Test, and Generalization
We have built a system for protecting Internet services to securely connected, known users. It implements a generate-and-test approach for on-line attack identification and uses s...
James C. Reynolds, James E. Just, Larry A. Clough,...
ICC
2009
IEEE
164views Communications» more  ICC 2009»
14 years 11 months ago
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
Intrusion Detection and/or Prevention Systems (IDPS) represent an important line of defense against the variety of attacks that can compromise the security and well functioning of...
Khalid Alsubhi, Issam Aib, Jérôme Fra...
83
Voted
TEC
2002
89views more  TEC 2002»
15 years 1 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
110
Voted
TC
2002
15 years 1 months ago
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection
Nong Ye, Syed Masum Emran, Qiang Chen, Sean Vilber...
114
Voted
EUROSYS
2009
ACM
15 years 11 months ago
Orchestra: intrusion detection using parallel execution and monitoring of program variants in user-space
In a Multi-Variant Execution Environment (MVEE), several slightly different versions of the same program are executed in lockstep. While this is done, a monitor compares the behav...
Babak Salamat, Todd Jackson, Andreas Gal, Michael ...