Sciweavers

1098 search results - page 153 / 220
» Proactive Intrusion Detection
Sort
View
DIMVA
2006
15 years 3 months ago
A Fast Worm Scan Detection Tool for VPN Congestion Avoidance
Finding the cause for congested virtual private network (VPN) links that connect an office network over the Internet to remote subsidiaries can be a hassle. Scan traffic of worm i...
Arno Wagner, Thomas Dübendorfer, Roman Hiesta...
SIGMOD
2001
ACM
142views Database» more  SIGMOD 2001»
16 years 1 months ago
Outlier Detection for High Dimensional Data
The outlier detection problem has important applications in the eld of fraud detection, network robustness analysis, and intrusion detection. Most such applications are high dimen...
Charu C. Aggarwal, Philip S. Yu
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
15 years 7 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
KAIS
2007
120views more  KAIS 2007»
15 years 1 months ago
Capabilities of outlier detection schemes in large datasets, framework and methodologies
Abstract. Outlier detection is concerned with discovering exceptional behaviors of objects. Its theoretical principle and practical implementation lay a foundation for some importa...
Jian Tang, Zhixiang Chen, Ada Wai-Chee Fu, David W...
SAC
2010
ACM
15 years 8 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...