Sciweavers

421 search results - page 56 / 85
» SCIDS: A Soft Computing Intrusion Detection System
Sort
View
70
Voted
CN
2007
90views more  CN 2007»
14 years 9 months ago
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
As next-generation computer worms may spread within minutes to millions of hosts, protection via human intervention is no longer an option. We discuss the implementation of SweetB...
Georgios Portokalidis, Herbert Bos
CONEXT
2007
ACM
14 years 11 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek
SP
1991
IEEE
121views Security Privacy» more  SP 1991»
15 years 1 months ago
The SRI IDES Statistical Anomaly Detector
SRI International’s real-time intrusion-detection expert system (IDES) system contains a statistical subsystem that observes behavior on a moniioreci cornpuier system and adapti...
H. S. Javitz, A. Valdes
BC
2008
73views more  BC 2008»
14 years 9 months ago
Interaction of ON and OFF pathways for visual contrast measurement
We propose a novel model of visual contrast measurement based on segregated ON and OFF pathways. Two driving forces have shaped our investigation: (1) establishing a mechanism sele...
Heiko Neumann, Luiz Pessoa, Thorsten Hansen
IWAN
2004
Springer
15 years 3 months ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood