Sciweavers

1112 search results - page 140 / 223
» On scalable attack detection in the network
Sort
View
GLOBECOM
2007
IEEE
15 years 6 months ago
Aggregated Bloom Filters for Intrusion Detection and Prevention Hardware
—Bloom Filters (BFs) are fundamental building blocks in various network security applications, where packets from high-speed links are processed using state-of-the-art hardwareba...
N. Sertac Artan, Kaustubh Sinkar, Jalpa Patel, H. ...
ICDM
2002
IEEE
188views Data Mining» more  ICDM 2002»
15 years 4 months ago
A Comparative Study of RNN for Outlier Detection in Data Mining
We have proposed replicator neural networks (RNNs) as an outlier detecting algorithm [15]. Here we compare RNN for outlier detection with three other methods using both publicly a...
Graham J. Williams, Rohan A. Baxter, Hongxing He, ...
IEEEARES
2008
IEEE
15 years 6 months ago
Effective Monitoring of a Survivable Distributed Networked Information System
In 2002, DARPA put together a challenging proposition to the research community: demonstrate using an existing information system and available DARPA developed and other COTS tech...
Paul Rubel, Michael Atighetchi, Partha Pratim Pal,...
NDSS
2000
IEEE
15 years 3 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
NETWORK
2008
94views more  NETWORK 2008»
14 years 11 months ago
Detecting compromised routers via packet forwarding behavior
While it is widely understood that criminal miscreants are subverting large numbers of Internet-connected computers (e.g., for bots, spyware, SPAM forwarding), it is less well app...
Alper Tugay Mizrak, Stefan Savage, Keith Marzullo