Sciweavers

79 search results - page 9 / 16
» MEPIDS: Multi-Expression Programming for Intrusion Detection...
Sort
View
80
Voted
ACSAC
1999
IEEE
15 years 8 months ago
Architecture and Concepts of the ARGuE Guard
ARGuE (Advanced Research Guard for Experimentation) is a prototype guard being developed as a basis for experimentation. ARGuE is based on Network Associates' Gauntlet firewa...
Jeremy Epstein
139
Voted
RAID
2007
Springer
15 years 9 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
115
Voted
RAID
2005
Springer
15 years 9 months ago
Behavioral Distance for Intrusion Detection
We introduce a notion, behavioral distance, for evaluating the extent to which processes—potentially running different programs and executing on different platforms—behave si...
Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
144
Voted
ASIAMS
2008
IEEE
15 years 10 months ago
Data Reduction and Ensemble Classifiers in Intrusion Detection
Efficiency is one of the major issues in intrusion detection. Inefficiency is often attributed to high overhead and this is caused by several reasons. Among them are continuous de...
Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam ...
135
Voted
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
15 years 7 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...