Sciweavers

1112 search results - page 6 / 223
» On scalable attack detection in the network
Sort
View
COMSWARE
2006
IEEE
15 years 3 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...
RAID
1999
Springer
15 years 1 months ago
Intrusion Detection for an On-Going Attack
An intrusion-detection system (IDS) for an on-going attack is described. Prior to an attack, an IDS operates in anticipation of a general threat. During an attack, the IDS can dea...
Jim Yuill, Shyhtsun Felix Wu, Fengmin Gong, Ming-Y...
CCS
2006
ACM
15 years 1 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
SIGCOMM
2012
ACM
12 years 12 months ago
SP4: scalable programmable packet processing platform
We propose the demonstration of SP4, a software-based programmable packet processing platform that supports (1) stateful packet processing useful for analyzing traffic flows wit...
Harjot Gill, Dong Lin, Lohit Sarna, Robert Mead, K...
CONEXT
2008
ACM
14 years 11 months ago
Distributed detection of large-scale attacks in the internet
Despite the many research activities that are performed in the field of attack prevention, detection, and mitigation, largescale attacks like Distributed Denial-of-Service (DDoS) ...
Thomas Gamer