Sciweavers

450 search results - page 9 / 90
» Network intrusion investigation - Preparation and challenges
Sort
View
NSDI
2010
14 years 11 months ago
Carousel: Scalable Logging for Intrusion Prevention Systems
We address the problem of collecting unique items in a large stream of information in the context of Intrusion Prevention Systems (IPSs). IPSs detect attacks at gigabit speeds and...
Vinh The Lam, Michael Mitzenmacher, George Varghes...
QOFIS
2000
Springer
15 years 1 months ago
The Fairness Challenge in Computer Networks
Abstract. In this paper, the concept of fairness as a future field of research in computer networks is investigated. We motivate the need of examining fairness issues by providing ...
Robert Denda, Albert Banchs, Wolfgang Effelsberg
76
Voted
IDEAL
2005
Springer
15 years 3 months ago
Identification of Anomalous SNMP Situations Using a Cooperative Connectionist Exploratory Projection Pursuit Model
Abstract. The work presented in this paper shows the capability of a connectionist model, based on a statistical technique called Exploratory Projection Pursuit (EPP), to identify ...
Álvaro Herrero, Emilio Corchado, José...
ISCC
2006
IEEE
127views Communications» more  ISCC 2006»
15 years 3 months ago
Aggregating Distributed Sensor Data for Network Intrusion Detection
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky
DSN
2004
IEEE
15 years 1 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra