Sciweavers

1098 search results - page 37 / 220
» Proactive Intrusion Detection
Sort
View
DFN
2003
14 years 11 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
ISCAPDCS
2001
14 years 11 months ago
Evaluation of Proactive Congestion Control on RED Gateway
In this paper we investigate the network performance of TCP hosts and gateways employing New Reno TCP using a parallel simulator. The gateway adopts the random early detection (RE...
Kuoling Fang, Hee Yong Youn, Hyunseung Choo, Chans...
IJNSEC
2008
117views more  IJNSEC 2008»
14 years 9 months ago
Wavelet-based Real Time Detection of Network Traffic Anomalies
Real time network monitoring for intrusions is offered by various host and network based intrusion detection systems. These systems largely use signature or pattern matching techni...
Chin-Tser Huang, Sachin Thareja, Yong-June Shin
HICSS
2005
IEEE
149views Biometrics» more  HICSS 2005»
15 years 3 months ago
ubiES: An Intelligent Expert System for Proactive Services Deploying Ubiquitous Computing Technologies
Expert systems are originally designed to generate feasible alternatives in automated manner. The users expect the systems to contribute to make decisions proactively and intellig...
Ohbyung Kwon, Keedong Yoo, Euiho Suh
ACSC
2005
IEEE
15 years 3 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie