Sciweavers

1098 search results - page 80 / 220
» Proactive Intrusion Detection
Sort
View
FPL
2003
Springer
164views Hardware» more  FPL 2003»
15 years 3 months ago
Fast, Large-Scale String Match for a 10Gbps FPGA-Based Network Intrusion Detection System
Intrusion Detection Systems such as Snort scan incoming packets for evidence of security threats. The most computation-intensive part of these systems is a text search against hund...
Ioannis Sourdis, Dionisios N. Pnevmatikatos
IJNSEC
2006
205views more  IJNSEC 2006»
14 years 9 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
JSAC
2006
172views more  JSAC 2006»
14 years 9 months ago
A Memory-Efficient Parallel String Matching Architecture for High-Speed Intrusion Detection
The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
Hongbin Lu, Kai Zheng, Bin Liu, Xin Zhang, Y. Liu
SIGSOFT
2011
ACM
14 years 4 months ago
Modeling a distributed intrusion detection system using collaborative building blocks
Developing complex distributed systems is a non-trivial task. It is even more difficult when the systems need to dynamically reconfigure the distributed functionalities or tasks...
Linda Ariani Gunawan, Michael Vogel, Frank Alexand...
ICCNMC
2005
Springer
15 years 3 months ago
Improved Thumbprint and Its Application for Intrusion Detection
This paper proposes RTT-thumbprint to traceback intruders, and to detect stepping-stone intrusion; RTT-thumbprint is a sequence of timestamp pairs of a send packet and its correspo...
Jianhua Yang, Shou-Hsuan Stephen Huang