Network intrusion detection system

Results: 247



#Item
81Computing / Network intrusion detection system / Snort / Intrusion detection system / Pcap / Transmission Control Protocol / Packet analyzer / Traffic flow / Packet capture / Software / Computer network security / System software

Predicting the Resource Consumption of Network Intrusion Detection Systems Holger Dreger1 , Anja Feldmann2, Vern Paxson3,4 , and Robin Sommer4,5 1 Siemens AG, Corporate Technology 2 Deutsche Telekom Labs / TU Berlin 3 U

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-06-14 01:31:02
82Computing / Data security / Intrusion detection system / Evasion / Anomaly detection / Denial-of-service attack / Network intrusion detection system / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-09 09:31:11
83Cyberwarfare / Snort / Intrusion detection system / Evasion / Transmission Control Protocol / Internet protocol suite / Bro / Computer network security / Software / Computer security

Detecting Network Intruders in Real Time Vern Paxson ICSI Center for Internet Research (ICIR) International Computer Science Institute and

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2003-05-06 03:43:28
84Computer security / Data mining / Statistics / Spamming / Anomaly detection / Intrusion detection system / Network intrusion detection system / Misuse detection / Snort / Computer network security / Data security / Computing

Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and Lawrence Berkeley National Laboratory

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2010-03-05 21:14:30
85Computer network security / Evasion / Metasploit Project / Internet protocol suite / IP fragmentation / Data link layer / Transmission Control Protocol / Internet Protocol / Intrusion detection system evasion techniques / Computing / Cyberwarfare / Computer security

Thermoptic Camouflage TOTAL IDS EVASION Brian Caswell H D Moore

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
86Computer network security / Internet protocols / OSI protocols / Transmission Control Protocol / Snort / Network intrusion detection system / Network packet / Transport layer / Traffic flow / Software / Computing / System software

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems (Extended Abstract) Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-23 21:17:18
87Cyberwarfare / Data security / Computer network security / Security / Computing / Intrusion detection system evasion techniques / Anomaly detection / Intrusion detection system / Computer security / Synthetic data

Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-25 01:06:21
88Intrusion detection systems / OSSEC / Rootkit / Installation / Linux distribution / SYS / Linux / Berkeley Software Distribution / System software / Software / Computer network security

Chapter 2 Installation Solutions in this chapter: ■

Add to Reading List

Source URL: www.ossec.net

Language: English - Date: 2012-06-29 13:37:34
89Multi-agent systems / Automated planning and scheduling / Reasoning system / Procedural reasoning system / Hierarchical task network / Planning / Artificial intelligence / Cognitive architecture / Problem solving

Plan Recognition in Intrusion Detection Systems Christopher W. Geib and Robert P. Goldman Honeywell Labs 3660 Technology Drive Minneapolis, MNUSA geib,goldman @htc.honeywell.com

Add to Reading List

Source URL: rpgoldman.goldman-tribe.org

Language: English - Date: 2009-08-06 12:04:58
90System software / Computer security / Intrusion detection system / Snort / Node / Peer-to-peer / ANts P2P / Blacklist / Microsoft SQL Server / Computing / Software / Computer network security

Global Intrusion Detection in the DOMINO Overlay System Vinod Yegneswaran Paul Barford ∗

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:19
UPDATE