Sciweavers

1098 search results - page 132 / 220
» Proactive Intrusion Detection
Sort
View
SEW
2003
IEEE
15 years 3 months ago
Addressing Software Security and Mitigations in the Life Cycle
Traditionally, security is viewed as an organizational and Information Technology (IT) systems function comprising of firewalls, intrusion detection systems (IDS), system security...
David P. Gilliam, John D. Powell, Eric Haugh, Matt...
ACNS
2009
Springer
113views Cryptology» more  ACNS 2009»
15 years 2 months ago
Fast Packet Classification Using Condition Factorization
Abstract. Rule-based packet classification plays a central role in network intrusion detection systems such as Snort. To enhance performance, these rules are typically compiled int...
Alok Tongaonkar, R. Sekar, Sreenaath Vasudevan
ACSAC
2006
IEEE
15 years 1 months ago
Offloading IDS Computation to the GPU
Signature-matching Intrusion Detection Systems can experience significant decreases in performance when the load on the IDS-host increases. We propose a solution that off-loads so...
Nigel Jacob, Carla E. Brodley
IJNSEC
2007
107views more  IJNSEC 2007»
14 years 10 months ago
A Rule-based Temporal Alert Correlation System
This paper reports a research work to address the problem of the large number of alerts generated by the detectors in an intrusion detection system. Some of these alerts are redun...
Peyman Kabiri, Ali A. Ghorbani
EC
2000
136views ECommerce» more  EC 2000»
14 years 9 months ago
Architecture for an Artificial Immune System
An artificial immune system (ARTIS) is described which incorporates many properties of natural immune systems, including diversity, distributed computation, error tolerance, dynam...
Steven A. Hofmeyr, Stephanie Forrest