Sciweavers

1098 search results - page 85 / 220
» Proactive Intrusion Detection
Sort
View
EGC
2005
Springer
15 years 3 months ago
Towards a Grid-wide Intrusion Detection System
We describe SANTA-G (Grid-enabled System Area Networks Trace Analysis), an instrument monitoring framework that uses the RGMA (Relational Grid Monitoring Architecture). We describe...
Stuart Kenny, Brian A. Coghlan
ICARIS
2004
Springer
15 years 3 months ago
Immune System Approaches to Intrusion Detection - A Review
The use of artificial immune systems in intrusion detection is an appealing concept for two reasons. Firstly, the human immune system provides the human body with a high level of ...
Uwe Aickelin, Julie Greensmith, Jamie Twycross
GECCO
2003
Springer
114views Optimization» more  GECCO 2003»
15 years 3 months ago
A Linear Genetic Programming Approach to Intrusion Detection
Abstract. Page-based Linear Genetic Programming (GP) is proposed and implemented with two-layer Subset Selection to address a two-class intrusion detection classification problem a...
Dong Song, Malcolm I. Heywood, A. Nur Zincir-Heywo...
ACSAC
1999
IEEE
15 years 2 months ago
An Application of Machine Learning to Network Intrusion Detection
Differentiating anomalous network activity from normal network traffic is difficult and tedious. A human analyst must search through vast amounts of data to find anomalous sequenc...
Chris Sinclair, Lyn Pierce, Sara Matzner
FPGA
2008
ACM
161views FPGA» more  FPGA 2008»
14 years 11 months ago
Implementing high-speed string matching hardware for network intrusion detection systems
This paper presents high-throughput techniques for implementing FSM based string matching hardware on FPGAs. By taking advantage of the fact that string matching operations for di...
Atul Mahajan, Benfano Soewito, Sai K. Parsi, Ning ...