Sciweavers

186 search results - page 9 / 38
» Operational Characteristics of an Automated Intrusion Respon...
Sort
View
USS
2004
14 years 11 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
OSDI
2004
ACM
15 years 9 months ago
Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control
This paper studies the use of statistical induction techniques as a basis for automated performance diagnosis and performance management. The goal of the work is to develop and ev...
Ira Cohen, Jeffrey S. Chase, Julie Symons, Mois&ea...
81
Voted
SOSP
2005
ACM
15 years 6 months ago
Capturing, indexing, clustering, and retrieving system history
We present a method for automatically extracting from a running system an indexable signature that distills the essential characteristic from a system state and that can be subjec...
Ira Cohen, Steve Zhang, Moisés Goldszmidt, ...
86
Voted
WSC
2008
14 years 12 months ago
A simulation based approach for supporting Automated Guided Vehicles (AGVs) systems design
Automated Guided Vehicle (AGV) logistic handling system are widely adopted when high transportation capacity and quality of service are the most important characteristics to reach...
Elisa Gebennini, Sara Dallari, Andrea Grassi, Gius...
ACSAC
2008
IEEE
15 years 4 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh