Intrusion detection system

Results: 338



#Item
101Network architecture / Network intrusion detection system / Denial-of-service attack / Intrusion detection system / Packet capture / Firewall / Router / Packet loss / Network forensics / Computer network security / Computing / Software

Enriching Network Security Analysis with Time Travel Gregor Maier Robin Sommer Holger Dreger

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-30 11:46:33
102Computer network security / Network intrusion detection system / Transmission Control Protocol / Snort / Traffic flow / Transport layer / Communications protocol / Network packet / Computing / Data / Information

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1 2

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-27 17:31:10
103Cyberwarfare / Computer security / Crime prevention / National security / Intrusion detection system / Network security / Telecommunications data retention / Threat / Surveillance / Computer network security / Security / Computing

Principles for Developing Comprehensive Network Visibility∗ Mark Allman, Christian Kreibich, Vern Paxson, Robin Sommer, Nicholas Weaver International Computer Science Institute Abstract

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-07-14 15:42:26
104Module theory / Syzygy / Anomaly detection / Anomaly / Intrusion detection system / Type I and type II errors / Statistics / Data mining / Spam filtering

Community Epidemic Detection using Time-Correlated Anomalies Adam J. Oliner, Ashutosh V. Kulkarni, and Alex Aiken Stanford University� {oliner, ashutosh.kulkarni, aiken}@cs.stanford.edu

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-09-07 15:35:08
105Internet protocols / Internet standards / Remote administration software / Telnet / Simple Network Management Protocol / Nmap / Cisco IOS / Network security / Router / Computing / Software / System software

8 steps to protect your Cisco router Daniel B. Cid Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Hone

Add to Reading List

Source URL: dcid.me

Language: English - Date: 2005-02-28 16:38:34
106Computing / Network intrusion detection system / Snort / Intrusion detection system / Pcap / Transmission Control Protocol / Packet analyzer / Traffic flow / Packet capture / Software / Computer network security / System software

Predicting the Resource Consumption of Network Intrusion Detection Systems Holger Dreger1 , Anja Feldmann2, Vern Paxson3,4 , and Robin Sommer4,5 1 Siemens AG, Corporate Technology 2 Deutsche Telekom Labs / TU Berlin 3 U

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-06-14 01:31:02
107Computing / Data security / Intrusion detection system / Evasion / Anomaly detection / Denial-of-service attack / Network intrusion detection system / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-09 09:31:11
108Cyberwarfare / Snort / Intrusion detection system / Evasion / Transmission Control Protocol / Internet protocol suite / Bro / Computer network security / Software / Computer security

Detecting Network Intruders in Real Time Vern Paxson ICSI Center for Internet Research (ICIR) International Computer Science Institute and

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2003-05-06 03:43:28
109Computer security / Data mining / Statistics / Spamming / Anomaly detection / Intrusion detection system / Network intrusion detection system / Misuse detection / Snort / Computer network security / Data security / Computing

Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and Lawrence Berkeley National Laboratory

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-03-05 21:14:30
110Computer network security / Evasion / Metasploit Project / Internet protocol suite / IP fragmentation / Data link layer / Transmission Control Protocol / Internet Protocol / Intrusion detection system evasion techniques / Computing / Cyberwarfare / Computer security

Thermoptic Camouflage TOTAL IDS EVASION Brian Caswell H D Moore

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
UPDATE