Results 321 to 330 of about 404,854 (339)
Some of the next articles are maybe not open access.

Intrusion Detection

Network Security, 2000
Intrusion Detection by Rebecca Bace is an intriguing book that focuses on intrusion detection, yet covers a lot more than pure intrusion detection-related issues. In a nutshell, this book covers what intrusion detection is, its history, why it is important, types of intrusion detection systems (IDSs) that have been developed over the years, ways to do ...
openaire   +2 more sources

Intrusion Detection in the Cloud

2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, 2009
Intrusion Detection Systems (IDS) have been used widely to detect malicious behaviors in network communication and hosts. IDS management is an important capability for distributed IDS solutions, which makes it possible to integrate and handle different types of sensors or collect and synthesize alerts generated from multiple hosts located in the ...
Feng Cheng   +2 more
openaire   +2 more sources

Intrusion Detection: Introduction to Intrusion Detection and Security Information Management

2005
This paper covers intrusion detection and security information management technologies. It presents a primer on intrusion detection, focusing on data sources and analysis techniques. Data sources presented therein are classified according to the capture mechanism and we include an evaluation of the accuracy of these data sources.
Hervé Debar, Jouni Viinikka
openaire   +1 more source

System Intrusion Detection and Prevention

2008
The psychology and politics of ownership have historically dictated that individuals and groups tend to protect valuable resources. This grew out of the fact that once a resource has been judged to have value, no matter how much protection given to it, there is always a potential that the security provided for the resource will at some point fail. This
openaire   +2 more sources

A Correlation Approach to Intrusion Detection

2010
In this paper we discuss the limitations of current Intrusion Detection System technology, and propose a hierarchical event correlation approach to overcome such limitations. The proposed solution allows to detect attack scenarios by collecting diverse information at several architectural levels, using distributed security probes, which is then used to
FICCO, Massimo, Romano
openaire   +4 more sources

Intrusion Detection Systems: To an Optimal Hybrid Intrusion Detection System

2019
New information and communication technologies are increasingly dominating our daily lives to the point of becoming indispensable. The computerization of society is now a reality, no sector is aloof from this transformation. This human invention, which has made progress, certainly facilitated the lives of human beings, but at the same time generated ...
Soumiya Ain El Hayat   +2 more
openaire   +2 more sources

Detecting Signs of Intrusion. [PDF]

open access: possible, 1997
Abstract : The module provides concrete, practical guidance to help organizations improve the security of their networked computer systems. It describes a set of practices that can help detect intrusions by looking for the fingerprints of known intrusion methods.
Robert Firth   +4 more
openaire   +1 more source

Intrusion detection at 100G

State of the Practice Reports, 2011
Driven by the growing data transfer needs of the scientific community and the standardization of the 100 Gbps Ethernet Specification, 100 Gbps is now becoming a reality for many HPC sites. This tenfold increase in bandwidth creates a number of significant technical challenges.
Scott W. Campbell, Jason Lee
openaire   +2 more sources

Distributed Intrusion Detection Systems

2006
Computer security is defined as the protection of computing systems against threats to confidentiality, integrity and availability. An intrusion is defined as any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource.
Ajith Abraham, Johnson Thomas
openaire   +1 more source

Preemptive intrusion detection

Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
This paper presents a system named SPOT to achieve high accuracy and preemptive detection of attacks. We use security logs of real-incidents that occurred over a six-year period at National Center for Supercomputing Applications (NCSA) to evaluate SPOT.
Keywhan Chung   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy