Results 141 to 150 of about 119,256 (176)
Some of the next articles are maybe not open access.
ULISSE, a network intrusion detection system
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead, 2008In this paper we present a tool for network anomaly detection and network intelligence which we named ULISSE. It uses a two tier architecture with unsupervised learning algorithms to perform network intrusion and anomaly detection. ULISSE uses a combination of clustering of packet payloads and correlation of anomalies in the packet stream.
openaire +3 more sources
Network Scanning, Intrusion Detection, and Intrusion Prevention Tools
2016Would your network withstand an attack? How easy would it be for someone to break into your network, find anything they want on your Mac, and steal enough information to masquerade as you on the Internet? To answer this question, you’d need to take a good hard look at your network and audit for intrusion vulnerabilities.
Charles Edge, Daniel O’Donnell
openaire +1 more source
Fast detection of network intrusion
SPIE Proceedings, 2011In this paper, we propose new network intrusion detection techniques which promptly detect malicious attacks and thus lower the resulting damage. Moreover, our approach rigorously control the probability of falsely implicating benign remote hosts as malicious.
Xinjia Chen, Ernest Walker
openaire +1 more source
Situation Awareness Network Intrusion Detection
2022Current intrusion detection solutions are based on signature or rule-based detection. The large number of malwares have made common intrusion detection solutions ineffective. An ideal protection is having an all-in-one rewall which could stop all known malware while also able to flag new types of attack.
openaire +1 more source
Self-Learning Network Intrusion Detection
it - Information Technology, 2011Zusammenfassung Services in the Internet are confronted with a growing amount and diversity of network attacks. Regular instruments of computer security increasingly fail to fend off this threat, as they rely on the manual generation of detection patterns and lack protection from unknown threats.
openaire +1 more source
Integrative oncology: Addressing the global challenges of cancer prevention and treatment
Ca-A Cancer Journal for Clinicians, 2022Jun J Mao,, Msce +2 more
exaly
Experiences with network intrusion detection
2002This paper describes our experience with several commercial Network Intrusion Detection Systems (NIDSs)deployed in a network connected to the Internet. Specific problems in the operation of NIDS are highlighted, and a number of solutions to identified problems will be presented.
Coolen, R. +3 more
openaire +1 more source

