Intrusion detection systems

Results: 104



#Item
21Computer network security / Intrusion detection systems / OSSEC / Computer security / Daniel B. Cid / Rootkit / Snort / Log analysis / Security log / System software / Software / Computing

Log Analysis using OSSEC Daniel B. Cid Copyright 2007 Daniel B. Cid

Add to Reading List

Source URL: ossec.net

Language: English - Date: 2012-06-29 13:37:34
22

Intrusion Detection Systems and IPv6∗ Arrigo Triulzi Abstract In this paper we will discuss the new challenges posed by the introduction of IPv6 to Intrusion Detection

Add to Reading List

Source URL: www.alchemistowl.org

- Date: 2007-05-11 03:50:02
    23

    Evaluation of Diagonal Confidence-Weighted Learning on the KDD Cup 1999 Dataset for Network Intrusion Detection Systems Matthew W. Pagano Johns Hopkins University 3400 North Charles Street Baltimore, MD 21218, USA

    Add to Reading List

    Source URL: hms.isi.jhu.edu

    Language: English - Date: 2012-02-05 23:54:00
      24Linux kernel / Monolithic kernels / Kernel / Grsecurity / Rootkit / Ring / PaX / Loadable kernel module / Mandatory access control / System software / Software / Computer architecture

      Intrusion detection for resource-constrained embedded control systems in the power grid

      Add to Reading List

      Source URL: www.cs.dartmouth.edu

      Language: English - Date: 2012-06-21 17:59:04
      25Computing / Hacking / Software testing / Alert correlation / Attack / Alert messaging / Buffer overflow / Vulnerability / Denial-of-service attack / Cyberwarfare / Computer security / Computer network security

      Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:26:18
      26Computer security / Malware / Rootkit / Ring / Hypervisor / Operating system / SCADA / Hardware virtualization / Kernel / System software / Software / Virtual machines

      Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith

      Add to Reading List

      Source URL: www.cs.dartmouth.edu

      Language: English - Date: 2011-07-11 16:31:17
      27Intrusion detection system / Content-addressable memory / Computer security / Cyberwarfare / Computer network security / Security / Computing

      Intrusion Management and ISMS by Dr. David Brewer Gamma Secure Systems Limited

      Add to Reading List

      Source URL: www.gammassl.co.uk

      Language: English - Date: 2013-01-11 08:20:35
      28Computing / Information technology management / Computer security / Formal sciences / System administration / Anomaly detection / Data quality / Data mining / Intrusion prevention system / Computer network security / System software / Intrusion detection systems

      Zuech et al. Journal of Big Data:3 DOIs40537SURVEY PA PER Open Access

      Add to Reading List

      Source URL: www.journalofbigdata.com

      Language: English
      29Science / Scientific modeling / Data / Data analysis / Data mining / Database / Systems engineering / Intrusion detection system / Relational database / Database management systems / Database theory / Data management

      COMPUTER SCIENCE RESEARCH PROJECTS 2004 Career: Towards Estimating Requirement Coverage: Managing Goals and Scenarios During Requirements Evolution Annie I. Anton National Science Foundation

      Add to Reading List

      Source URL: www.csc.ncsu.edu

      Language: English - Date: 2013-12-09 11:41:13
      30Alert correlation / Alert messaging

      Hypothesizing and Reasoning about Attacks Missed by Intrusion Detection Systems PENG NING and DINGBANG XU North Carolina State University Several alert correlation methods have been proposed over the past several years

      Add to Reading List

      Source URL: discovery.csc.ncsu.edu

      Language: English - Date: 2011-11-09 13:26:18
      UPDATE