Sciweavers

6 search results - page 1 / 2
» POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection...
Sort
View
96
Voted
IWIA
2006
IEEE
15 years 7 months ago
POSEIDON: a 2-tier Anomaly-based Network Intrusion Detection System
We present POSEIDON, a new anomaly-based network intrusion detection system. POSEIDON is payload-based, and has a two-tier architecture: the first stage consists of a Self-Organi...
Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel, ...
109
Voted
RAID
2009
Springer
15 years 7 months ago
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems
Damiano Bolzoni, Sandro Etalle, Pieter H. Hartel
96
Voted
IPPS
2007
IEEE
15 years 7 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White
115
Voted
ICIAP
2005
ACM
16 years 1 months ago
Analyzing TCP Traffic Patterns Using Self Organizing Maps
The continuous evolution of the attacks against computer networks has given renewed strength to research on anomaly based Intrusion Detection Systems, capable of automatically dete...
Stefano Zanero
114
Voted
SECURWARE
2008
IEEE
15 years 7 months ago
ToLeRating UR-STD
A new emerging paradigm of Uncertain Risk of Suspicion, Threat and Danger, observed across the field of information security, is described. Based on this paradigm a novel approac...
Jan Feyereisl, Uwe Aickelin