Sciweavers

1244 search results - page 5 / 249
» Network Intrusion Detection System with Data Mart
Sort
View
IPOM
2009
Springer
15 years 4 months ago
A Labeled Data Set for Flow-Based Intrusion Detection
Abstract. Flow-based intrusion detection has recently become a promising security mechanism in high speed networks (1-10 Gbps). Despite the richness in contributions in this field...
Anna Sperotto, Ramin Sadre, Frank van Vliet, Aiko ...
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
15 years 3 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
ACSAC
2010
IEEE
14 years 7 months ago
Network intrusion detection: dead or alive?
Research on network intrusion detection has produced a number of interesting results. In this paper, I look back to the NetSTAT system, which was presented at ACSAC in 1998. In ad...
Giovanni Vigna
86
Voted
ICONIP
2004
14 years 11 months ago
Hybrid Feature Selection for Modeling Intrusion Detection Systems
Most of the current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (...
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thoma...
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
15 years 10 months ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier