Network intrusion detection system

Results: 247



#Item
171Cyberwarfare / AAFID / Data security / Intrusion detection system / Anomaly detection / Mobile agent / Software agent / Bro / Network intrusion detection system / Computer security / Computer network security / Computing

NISTIR 6416, Applying Mobile Agents to Intrusion Detection and Response

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-09 09:38:16
172Security / AAFID / Hacking / Intrusion detection system / Denial-of-service attack / Vulnerability / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems* Peter Mell, Mark McLarnon [removed], [removed] National Institute of Standards and Technology 100 Bureau Dr. Stop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
173Computer security / Denial-of-service attack / Intrusion detection system / Malware / Internet security / AAFID / Exploit / Private network / Firewall / Computer network security / Cyberwarfare / Computing

A Denial of Service Resistant Intrusion Detection Architecture Peter Mell, Donald Marks, Mark McLarnon National Institute of Standards and Technology Computer Security Division[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
174Cyberwarfare / Security / Computer networking / Application firewall / Network performance / Firewall / Denial-of-service attack / Intrusion detection system / Proxy server / Computer network security / Computing / Computer security

UNCLASSIFIED Joint Information Environment Single Security Architecture (JIE SSA) Danielle Metz

Add to Reading List

Source URL: www.afcea.org

Language: English - Date: 2014-05-15 14:13:06
175Computing / Iptables / Snort / Netfilter / Intrusion detection system / Firewall / Thresh / Pcap / Port knocking / Software / System software / Computer network security

fire_03.book Page 291 Monday, August 27, 2007 3:54 PM INDEX A ALERTING_METHODS variable, in psad.conf

Add to Reading List

Source URL: www.tinker.tv

Language: English - Date: 2012-02-08 15:24:21
176Technology / SCADA / Computer security / Network security / Internet security / Attack / Malware / Intrusion detection system / Computer network security / Security / Cyberwarfare

CS&IIR Workshop 2006 Overview and Agenda The actual schedule is slightly modified from the times indicated below as follows. Wednesday’s Keynote has been moved to the first talk after lunch. All presenters up to that t

Add to Reading List

Source URL: www.csm.ornl.gov

Language: English - Date: 2006-05-09 23:15:32
177Anomaly detection / Statistics / Transmission Control Protocol / Computing / Denial-of-service attack / Anomaly / Data / Computer network security / Denial-of-service attacks / Intrusion detection system

Evaluation of an Online Parallel Anomaly Detection System Shashank Shanbhag and Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts Amherst, MA 01003–9284

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:26
178Cyberwarfare / Crime prevention / National security / Data security / Managed Trusted Internet Protocol Service / Intrusion prevention system / Intrusion detection system / Information security / Attack / Security / Computer security / Computer network security

PDF Document

Add to Reading List

Source URL: archives.gov

Language: English - Date: 2013-11-06 08:55:09
179Software testing / Computer network security / Statistics / Data security / Intrusion detection system / Anomaly detection / Denial-of-service attack / Attack patterns / Vulnerability / Computer security / Hacking / Cyberwarfare

On Widening the Scope of Attack Recognition Languages Jon Doyle, Howard Shrobe, and Peter Szolovits Massachusetts Institute of Technology Cambridge, MA[removed]May 30, 2000

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2001-01-16 16:05:44
180Internet / Computer worms / Code Red / Malware / Witty / Subnetwork / Morris worm / Classless Inter-Domain Routing / Intrusion detection system / Network architecture / Routing / Computing

On the Effectiveness of Distributed Worm Monitoring Moheeb Abu Rajab Fabian Monrose Andreas Terzis

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2005-09-11 12:46:40
UPDATE