Sciweavers

1013 search results - page 74 / 203
» Storage-Based Intrusion Detection
Sort
View
134
Voted
EUROSEC
2010
ACM
15 years 10 months ago
Improving the accuracy of network intrusion detection systems under load using selective packet discarding
Under conditions of heavy traffic load or sudden traffic bursts, the peak processing throughput of network intrusion detection systems (NIDS) may not be sufficient for inspecting ...
Antonis Papadogiannakis, Michalis Polychronakis, E...
CNSR
2007
IEEE
15 years 10 months ago
Testing Intrusion Detection Systems in MANET: A Comprehensive Study
In this paper, we study the problem of testing Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANET). Testing is achieved by simulating different measurements. We mo...
Hadi Otrok, Joey Paquet, Mourad Debbabi, Prabir Bh...
205
Voted
HOLOMAS
2007
Springer
15 years 9 months ago
Agent Methods for Network Intrusion Detection and Response
While the need to build the Intrusion Detection Systems (IDS) based on on a distributed and cooperative (P2P) paradigm is being generally acknowledged, the field has been disconne...
Martin Rehák, Michal Pechoucek, David Medvi...
123
Voted
ISCC
2006
IEEE
127views Communications» more  ISCC 2006»
15 years 9 months ago
Aggregating Distributed Sensor Data for Network Intrusion Detection
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of sensors are becoming increasing popular. Managing and presenting the informati...
John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky
135
Voted
FPL
2005
Springer
137views Hardware» more  FPL 2005»
15 years 9 months ago
Bitwise Optimised CAM for Network Intrusion Detection Systems
String pattern matching is a computationally expensive task, and when implemented in hardware, it can consume a large amount of resources for processing and storage. This paper pr...
Sherif Yusuf, Wayne Luk