Sciweavers

1013 search results - page 130 / 203
» Storage-Based Intrusion Detection
Sort
View
199
Voted
MEMOCODE
2010
IEEE
15 years 1 months ago
A regular expression matching using non-deterministic finite automaton
Abstract--This paper shows an implementation of CANSCID (Combined Architecture for Stream Categorization and Intrusion Detection). To satisfy the required system throughput, the pa...
Hiroshi Nakahara, Tsutomu Sasao, Munehiro Matsuura
127
Voted
RAID
2005
Springer
15 years 9 months ago
FLIPS: Hybrid Adaptive Intrusion Prevention
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...
159
Voted
ACMSE
2008
ACM
15 years 5 months ago
A distributed firewall and active response architecture providing preemptive protection
Firewalls provide very good network security features. However, classical perimeter firewall deployments suffer from limitations due to complex network topologies and the inabilit...
J. Lane Thames, Randal Abler, David Keeling
ECBS
2002
IEEE
114views Hardware» more  ECBS 2002»
15 years 8 months ago
An Intelligent Agent Security Intrusion System
Network security has now become one of the most important aspects in computer systems and the Internet. Apart from strong encryption, there is no definite method of truly securing...
J. Pikoulas, William J. Buchanan, Mike Mannion, K....
CN
2007
224views more  CN 2007»
15 years 3 months ago
Automated adaptive intrusion containment in systems of interacting services
Large scale distributed systems typically have interactions among different services that create an avenue for propagation of a failure from one service to another. The failures ...
Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagc...