Sciweavers

1098 search results - page 182 / 220
» Proactive Intrusion Detection
Sort
View
CCS
2007
ACM
15 years 5 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
ISVC
2007
Springer
15 years 5 months ago
A Scalable Aural-Visual Environment for Security Event Monitoring, Analysis, and Response
Abstract. Intrusion detection systems gather large quantities of host and network information in an attempt to detect and respond to attacks against an organization. The widely var...
Paul Z. Kolano
ACSAC
2006
IEEE
15 years 5 months ago
NetSpy: Automatic Generation of Spyware Signatures for NIDS
We present NetSpy, a tool to automatically generate network-level signatures for spyware. NetSpy determines whether an untrusted program is spyware by correlating user input with ...
Hao Wang, Somesh Jha, Vinod Ganapathy
SASN
2006
ACM
15 years 5 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
AIIA
2005
Springer
15 years 5 months ago
Experimental Evaluation of Hierarchical Hidden Markov Models
Building profiles for processes and for interactive users is a important task in intrusion detection. This paper presents the results obtained with a Hierarchical Hidden Markov Mo...
Attilio Giordana, Ugo Galassi, Lorenza Saitta