Sciweavers

450 search results - page 22 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
ICCCN
2007
IEEE
15 years 4 months ago
Fates: A Granular Approach to Real-Time Anomaly Detection
— Anomaly-based intrusion detection systems have the ability of detecting novel attacks, but in real-time detection, they face the challenges of producing many false alarms and f...
Jeff Janies, Chin-Tser Huang
DFN
2009
14 years 10 months ago
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
: While more and more applications require higher network bandwidth, there is also a tendency that large portions of this bandwidth are misused for dubious purposes, such as unauth...
Florian Mansmann, Fabian Fischer, Daniel A. Keim, ...
76
Voted
ICCV
2003
IEEE
15 years 3 months ago
An automatic drowning detection surveillance system for challenging outdoor pool environments
Automatically understanding events happening at a site is the ultimate goal of visual surveillance system. This paper investigates the challenges faced by automated surveillance s...
How-Lung Eng, Kar-Ann Toh, Alvin Harvey Kam, Junxi...
DATE
2006
IEEE
140views Hardware» more  DATE 2006»
15 years 3 months ago
Optimization of regular expression pattern matching circuits on FPGA
Regular expressions are widely used in Network Intrusion Detection System (NIDS) to represent patterns of network attacks. Since traditional software-only NIDS cannot catch up to ...
Cheng-Hung Lin, Chih-Tsun Huang, Chang-Ping Jiang,...
ICNC
2005
Springer
15 years 3 months ago
An Unsupervised Cooperative Pattern Recognition Model to Identify Anomalous Massive SNMP Data Sending
In this paper, we review a visual approach and propose it for analysing computer-network activity, which is based on the use of unsupervised connectionist neural network models and...
Álvaro Herrero, Emilio Corchado, José...