Sciweavers

1112 search results - page 10 / 223
» On scalable attack detection in the network
Sort
View
RAID
2001
Springer
15 years 1 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
HOLOMAS
2007
Springer
15 years 3 months ago
Agent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Martin Rehák, Michal Pechoucek, David Medvi...
NDSS
2003
IEEE
15 years 2 months ago
Detecting Service Violations and DoS Attacks
Denial of Service (DoS) attacks are a serious threat for the Internet. DoS attacks can consume memory, CPU, and network resources and damage or shut down the operation of the reso...
Ahsan Habib, Mohamed Hefeeda, Bharat K. Bhargava
NDSS
1998
IEEE
15 years 1 months ago
Attack Detection Methods for All-Optical Networks
This paper focuses on theoretical methods for detecting intentional attacks upon the infrastructure of an all-optical network. Applications of existing methods used in traditional...
Muriel Médard, Douglas Marquis, Stephen R. ...
ICDCSW
2011
IEEE
13 years 9 months ago
SenSec: A Scalable and Accurate Framework for Wireless Sensor Network Security Evaluation
—Developing secure wireless sensor networks (WSNs) is a complex process that involves careful design of attack test cases and security countermeasures, as well as meaningful eval...
Yi-Tao Wang, Rajive Bagrodia