Sciweavers

1013 search results - page 66 / 203
» Storage-Based Intrusion Detection
Sort
View
109
Voted
CN
2000
95views more  CN 2000»
15 years 3 months ago
The 1999 DARPA off-line intrusion detection evaluation
Abstract. Eight sites participated in the second DARPA off-line intrusion detection evaluation in 1999. A test bed generated live background traffic similar to that on a government...
Richard Lippmann, Joshua W. Haines, David J. Fried...
130
Voted
ICAPR
2005
Springer
15 years 9 months ago
GP Ensemble for Distributed Intrusion Detection Systems
In this paper an intrusion detection algorithm based on GP ensembles is proposed. The algorithm runs on a distributed hybrid multiisland model-based environment to monitor security...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
FSKD
2006
Springer
106views Fuzzy Logic» more  FSKD 2006»
15 years 7 months ago
Fuzzy Optimization for Security Sensors Deployment in Collaborative Intrusion Detection System
This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the "Distributed Network Security Sensors" distributed among the...
Chengchen Hu, Zhen Liu, Zhen Chen, Bin Liu
126
Voted
CORR
2008
Springer
125views Education» more  CORR 2008»
15 years 3 months ago
Sensing Danger: Innate Immunology for Intrusion Detection
The immune system provides an ideal metaphor for anomaly detection in general and computer security in particular. Based on this idea, artificial immune systems have been used for...
Uwe Aickelin, Julie Greensmith
JSW
2007
138views more  JSW 2007»
15 years 3 months ago
Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems
— The anomaly-based intrusion detection systems examine current system activity do find deviations from normal system activity. The present paper proposes a method for normal act...
Veselina G. Jecheva, Evgeniya P. Nikolova