Sciweavers

2236 search results - page 23 / 448
» Intrusion detection techniques and approaches
Sort
View
ACSAC
2004
IEEE
15 years 1 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
ACSAC
2001
IEEE
15 years 1 months ago
Application Intrusion Detection using Language Library Calls
Traditionally, intrusion detection systems detect intrusions at the operating system (OS) level. In this paper we explore the possibility of detecting intrusion at the application...
Anita K. Jones, Yu Lin
JSS
2002
198views more  JSS 2002»
14 years 9 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
DEON
2008
Springer
14 years 11 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...
NOMS
2010
IEEE
222views Communications» more  NOMS 2010»
14 years 8 months ago
Bayesian decision aggregation in collaborative intrusion detection networks
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...