Sciweavers

2236 search results - page 86 / 448
» Intrusion detection techniques and approaches
Sort
View
CSREAESA
2010
14 years 8 months ago
An Approach for Efficient Real Time Moving Object Detection
Moving object detection is essential for real-time surveillance; however, it is challenging to support moving object detection in a timely fashion due to the compute-intensive natu...
Arnab Roy, Sanket Shinde, Kyoung-Don Kang
ETRICS
2006
15 years 1 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
AINA
2009
IEEE
15 years 4 months ago
Similarity Search over DNS Query Streams for Email Worm Detection
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Nikolaos Chatzis, Nevil Brownlee
ANCS
2007
ACM
15 years 2 months ago
An improved algorithm to accelerate regular expression evaluation
Modern network intrusion detection systems need to perform regular expression matching at line rate in order to detect the occurrence of critical patterns in packet payloads. Whil...
Michela Becchi, Patrick Crowley
SIGMOD
2001
ACM
142views Database» more  SIGMOD 2001»
15 years 10 months ago
Outlier Detection for High Dimensional Data
The outlier detection problem has important applications in the eld of fraud detection, network robustness analysis, and intrusion detection. Most such applications are high dimen...
Charu C. Aggarwal, Philip S. Yu