Sciweavers

1013 search results - page 91 / 203
» Intrusion detection
Sort
View
ACSAC
2000
IEEE
15 years 10 months ago
A Network Audit System for Host-based Intrusion Detection (NASHID) in Linux
Recent work has shown that conventional operating system audit trails are insufficient to detect low-level network attacks. Because audit trails are typically based upon system c...
Thomas E. Daniels, Eugene H. Spafford
HAIS
2008
Springer
15 years 6 months ago
Classification Agent-Based Techniques for Detecting Intrusions in Databases
This paper presents an agent specially designed for the prevention and detection of SQL injection at the database layer of an application. The agent incorporates a Case-based reaso...
Cristian Pinzón, Yanira de Paz, Rosa Cano
SAINT
2003
IEEE
15 years 10 months ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
IPSN
2005
Springer
15 years 11 months ago
Lifetime-aware intrusion detection under safeguarding constraints
: This paper addresses the problem of maximizing the service lifetime of a distributed battery-powered sensor network in the context of the network interdiction problem under user-...
Ali Iranli, Hanif Fatemi, Massoud Pedram
IWIA
2003
IEEE
15 years 10 months ago
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
1 A new method for detecting anomalies in the usage of protocols in computer networks is presented in this work. The proposed methodology is applied to TCP and disposed in two step...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...