Intrusion detection systems

Results: 104



#Item
31

Modelling to Simulate Botnet Command and Control Protocols for the Evaluation of Network Intrusion Detection Systems. Georges Bossert Guillaume Hiet

Add to Reading List

Source URL: www.amossys.fr

Language: French - Date: 2012-07-25 04:28:30
    32Computer security / Data security / Intrusion detection systems / Snort / Anomaly detection / Network intrusion detection system / Intrusion prevention system / Alert correlation / Evasion / Computer network security / System software / Software

    PDF Document

    Add to Reading List

    Source URL: romisatriawahono.net

    Language: English - Date: 2013-01-23 01:11:11
    33Information / Mutual information / Anomaly detection / Intrusion detection system / Function / Statistics / Information theory / Mathematics

    Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems Guofei Gu1 , Prahlad Fogla1 , David Dagon1 , Wenke Lee1 and Boris Skoric2 1 Georgia Institute of Technology, U.S.A.

    Add to Reading List

    Source URL: members.home.nl

    Language: English - Date: 2008-12-09 00:54:25
    34Computer network security / Network intrusion detection system / Transmission Control Protocol / Snort / Traffic flow / Transport layer / Communications protocol / Network packet / Computing / Data / Information

    A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1 2

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2008-05-27 17:31:10
    35Fault-tolerant computer systems / Computer cluster / Scalability / Computing / Concurrent computing / Parallel computing

    The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware Matthias Vallentin3 , Robin Sommer2,1 , Jason Lee2 , Craig Leres2 , Vern Paxson1,2, and Brian Tierney2 1 2

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2007-06-15 15:22:50
    36Internet protocols / Internet standards / Remote administration software / Telnet / Simple Network Management Protocol / Nmap / Cisco IOS / Network security / Router / Computing / Software / System software

    8 steps to protect your Cisco router Daniel B. Cid Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Hone

    Add to Reading List

    Source URL: dcid.me

    Language: English - Date: 2005-02-28 16:38:34
    37Computing / Network intrusion detection system / Snort / Intrusion detection system / Pcap / Transmission Control Protocol / Packet analyzer / Traffic flow / Packet capture / Software / Computer network security / System software

    Predicting the Resource Consumption of Network Intrusion Detection Systems Holger Dreger1 , Anja Feldmann2, Vern Paxson3,4 , and Robin Sommer4,5 1 Siemens AG, Corporate Technology 2 Deutsche Telekom Labs / TU Berlin 3 U

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2008-06-14 01:31:02
    38Computing / Data security / Intrusion detection system / Evasion / Anomaly detection / Denial-of-service attack / Network intrusion detection system / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

    NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-11-09 09:31:11
    39Computer network security / Internet protocols / OSI protocols / Transmission Control Protocol / Snort / Network intrusion detection system / Network packet / Transport layer / Traffic flow / Software / Computing / System software

    A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems (Extended Abstract) Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2008-05-23 21:17:18
    40Cyberwarfare / Data security / Computer network security / Security / Computing / Intrusion detection system evasion techniques / Anomaly detection / Intrusion detection system / Computer security / Synthetic data

    Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2008-01-25 01:06:21
    UPDATE