Sciweavers

1013 search results - page 44 / 203
» Storage-Based Intrusion Detection
Sort
View
COMSNETS
2012
199views more  COMSNETS 2012»
13 years 9 months ago
Varanus: More-with-less fault localization in data centers
Abstract—Detecting and localizing performance faults is crucial for operating large enterprise data centers. This problem is relatively straightforward to solve if each entity (a...
Vaishali P. Sadaphal, Maitreya Natu, Harrick M. Vi...
AHSWN
2006
206views more  AHSWN 2006»
15 years 2 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
CORR
2008
Springer
125views Education» more  CORR 2008»
15 years 2 months ago
Data Reduction in Intrusion Alert Correlation
: Network intrusion detection sensors are usually built around low level models of network traffic. This means that their output is of a similarly low level and as a consequence, ...
Gianni Tedesco, Uwe Aickelin
SNPD
2007
15 years 3 months ago
Detecting Compromised Nodes in Wireless Sensor Networks
While wireless sensor networks are proving to be a versatile tool, many of the applications in which they are implemented have sensitive data. In other words, security is crucial ...
Mary Mathews, Min Song, Sachin Shetty, Rick McKenz...
APSCC
2006
IEEE
15 years 4 months ago
GHIDS: Defending Computational Grids against Misusing of Shared Resources
Detecting intrusions at host level is vital to protecting shared resources in grid, but traditional Host-based Intrusion Detecting System (HIDS) is not suitable for grid environme...
Guofu Feng, Xiaoshe Dong, Weizhe Liu, Ying Chu, Ju...