Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
In this paper we propose a peer-to-peer (P2P) prototype (INTCTD) for intrusion detection over an overlay network. INTCTD is a distributed system based on neural networks for detec...
: Malicious network traffic, including widespread worm activity, is a growing threat to Internet-connected networks and hosts. In this paper, we consider two competing approaches t...