Intrusion

Results: 1878



#Item
451Transmission Control Protocol / Packet Processing / Intrusion prevention system / Packet loss / Network switch / CPU cache / Snort / Network processor / Packet capture / Computer network security / Computing / Firewall

Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention Jose M Gonzalez Vern Paxson

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2007-09-08 20:27:32
452Cyberwarfare / Snort / Intrusion detection system / Evasion / Transmission Control Protocol / Internet protocol suite / Bro / Computer network security / Software / Computer security

Detecting Network Intruders in Real Time Vern Paxson ICSI Center for Internet Research (ICIR) International Computer Science Institute and

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2003-05-06 03:43:28
453Computer security / Data mining / Statistics / Spamming / Anomaly detection / Intrusion detection system / Network intrusion detection system / Misuse detection / Snort / Computer network security / Data security / Computing

Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and Lawrence Berkeley National Laboratory

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-03-05 21:14:30
454Computer network security / Evasion / Metasploit Project / Internet protocol suite / IP fragmentation / Data link layer / Transmission Control Protocol / Internet Protocol / Intrusion detection system evasion techniques / Computing / Cyberwarfare / Computer security

Thermoptic Camouflage TOTAL IDS EVASION Brian Caswell H D Moore

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
455Network architecture / Distributed data storage / Distributed computing architecture / Overlay network / Routing / Link-state routing protocol / Computer network / Flooding / Distributed hash table / Routing algorithms / Computing / Computer architecture

Intrusion-Tolerant Cloud Monitoring and Control Daniel Obenshain Tom Tantillo Andrew Newell

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2013-09-18 16:37:33
456Computer network security / Internet protocols / OSI protocols / Transmission Control Protocol / Snort / Network intrusion detection system / Network packet / Transport layer / Traffic flow / Software / Computing / System software

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems (Extended Abstract) Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-23 21:17:18
457Cyberwarfare / Data security / Computer network security / Security / Computing / Intrusion detection system evasion techniques / Anomaly detection / Intrusion detection system / Computer security / Synthetic data

Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-25 01:06:21
458CPU cache / Cache / Central processing unit / Computer memory / Virtual LAN / Internet Protocol / Packet Processing / Traffic flow / Transmission Control Protocol / Computing / Network architecture / Computer architecture

The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention Nicholas Weaver Vern Paxson

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-12-27 02:45:54
459Intrusion detection systems / OSSEC / Rootkit / Installation / Linux distribution / SYS / Linux / Berkeley Software Distribution / System software / Software / Computer network security

Chapter 2 Installation Solutions in this chapter: ■

Add to Reading List

Source URL: www.ossec.net

Language: English - Date: 2012-06-29 13:37:34
460Computer security / Cyberwarfare / Computing / Computer network security / Data security / Intrusion detection systems

Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
UPDATE