Sciweavers

2236 search results - page 38 / 448
» Intrusion detection techniques and approaches
Sort
View
FCCM
2004
IEEE
269views VLSI» more  FCCM 2004»
15 years 1 months ago
FPGA Based Network Intrusion Detection using Content Addressable Memories
In this paper, we introduce a novel architecture for a hardware based network intrusion detection system (NIDS). Current software-based NIDS are too compute intensive and can not ...
Long Bu, John A. Chandy
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 2 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
SNPD
2007
14 years 11 months ago
Detecting Compromised Nodes in Wireless Sensor Networks
While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial ...
Mary Mathews, Min Song, Sachin Shetty, Rick McKenz...
RAID
2005
Springer
15 years 3 months ago
Interactive Visualization for Network and Port Scan Detection
Many times, network intrusion attempts begin with either a network scan, where a connection is attempted to every possible destination in a network, or a port scan, where a connect...
Chris Muelder, Kwan-Liu Ma, Tony Bartoletti
AHSWN
2006
206views more  AHSWN 2006»
14 years 10 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch