A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Top-Down Delivery of IoT-based Applications for Seniors Behavior Change Capturing Exploiting a Model-Driven Approach
2018
Journal of Communications Software and Systems
In WoX, almost all the IoT entities and concepts are limited to the concept of Topic, i.e. an entity containing the value of a feature of interest that we intend to detect. ...
Developing Internet of Things (IoT) requires expertise and considerable skills in different fields in order to cover all the involved heterogeneous technologies, communication formats and protocols. ...
A LEA is the finest grain atomic information used to detect behavior of elderly people. ...
doi:10.24138/jcomss.v14i1.438
fatcat:cd7gexlcebfhbk6z6wdozefbmq
Using Failure Information Analysis to Detect Enterprise Zombies
[chapter]
2009
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
We propose failure information analysis as a novel strategy for uncovering malware activity and other anomalies in enterprise network traffic. ...
The system uses an SVM-based classification engine to identify suspicious systems and clustering to aggregate failure activity of related enterprise hosts. ...
Our approach: In this paper, we introduce a new behavior-based approach to detect infected hosts within an enterprise network. ...
doi:10.1007/978-3-642-05284-2_11
fatcat:2klhpaekdbftvgjrqrl4rwnmte
Real Time Detection Framework of Insider Threat Based Agent
2018
DEStech Transactions on Computer Science and Engineering
In view of the increasing internal threat behavior of enterprise information system, especially the internal user data corruption. ...
A real time detection framework based on agent is proposed, and malicious insider threats are identified by comparing user identity and abnormal operation behavior. ...
The principal task of the detection module is to use the internal threat detection rules and knowledge base to compare and analyze the user behavior data, output the system alarm and suspicious event information ...
doi:10.12783/dtcse/cmee2017/20071
fatcat:3uhik3kiozfu7kj654voeeyhgy
An architecture of a distributed intrusion detection system using cooperating agents
2006
2006 International Conference on Computing & Informatics
The results show the effectiveness of our system in detecting intrusive activities in any network of workstations. ...
An Intrusion Detection System (IDS) is a security mechanism that is expected to monitor and detect intrusions into the computer systems in real time. ...
in getting data only from local host, local domain, or the entire enterprise network. ...
doi:10.1109/icoci.2006.5276474
fatcat:hy455mnxcrbs5oq44dcyenwny4
Policy-Based Security Configuration Management, Application to Intrusion Detection and Prevention
2009
2009 IEEE International Conference on Communications
IDPSes can be network or host-based and can collaborate in order to provide better detections of malicious traffic. ...
of an enterprise information system. ...
IDPSes can be network or host-based and can collaborate into centralized or distributed clusters in order to provide better detections of malicious traffic across a distributed networked system. ...
doi:10.1109/icc.2009.5199341
dblp:conf/icc/AlsubhiAFB09
fatcat:7abcmrhcwve6vc7nq5gholxe5a
Intrusion Detection System Based on Data Mining Techniques
2017
Oriental journal of computer science and technology
Network security is one of the most important non-functional requirements in a system. Over the years, many software solutions have been developed to enhance network security. ...
The need for IDS in a system environment and the generic blocks in IDS is also mentioned.The examples are as follows: (1) Misuse intrusion detection system that uses state transition analysis approach, ...
Application Applications of intrusion detection by data mining are as follows: The goal of intrusion detection is to detect • security violations in information systems. ...
doi:10.13005/ojcst/10.02.33
fatcat:amrrr4lsdjf4pmokd4hrsh2mgq
Network Threat Behavior Detection and Trend Analysis Based on the TDLC Model
2013
The Smart Computing Review
In this paper, we present a network detection method based on a collaborative model against network threats and attacks, as well as trend analysis of network structure. ...
Therefore, network intrusion detection becomes a great challenge to security in both industry and academics. ...
Here are the services involved in the assessment model: concepts of risk, index of hosts and network, and its corresponding calculation. ...
doi:10.6029/smartcr.2013.04.007
fatcat:7hrjtevb65gybcpfdsablho5qa
Decrypting SSL/TLS traffic for hidden threats detection
[article]
2019
arXiv
pre-print
The developed approach has been automated and can be used for remote listening of the network, which will allow to decrypt transmitted data in a mode close to real time. ...
Methods and technologies for detecting malicious activity in encrypted traffic that are used by leading companies are also considered. ...
It is widely distributed in enterprises and is growing rapidly due to the rapid increase in mobile, cloud and web applications. ...
arXiv:1904.08383v1
fatcat:rmqukojpw5bxvoqcxfovu6dmbe
Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research
[article]
2021
arXiv
pre-print
Maintaining security and privacy in real-world enterprise networks is becoming more and more challenging. ...
To develop novel and effective methods to thwart these sophisticated cyberattacks, we need datasets that reflect real-world enterprise scenarios to a high degree of accuracy. ...
Provenance-based approaches provide a robust representation of network events that offer insights into the collective network behavior, at the cost of some detection sensitivity compared to NN approaches ...
arXiv:2103.03080v2
fatcat:wg6fdmvf6nh4bhz7wlw5bel5oa
Towards a taxonomy of intrusion-detection systems
1999
Computer Networks
bstract Intrusion-detection systems aim at detecting attacks against computer systems and networks, or against information systems in general, as it is difficult to provide provably secure information ...
They detect attempts and active misuse by legitimate users of the information systems or external parties to abuse their privileges or exploit security vulnerabilities. ...
Host-based Õersus network-based intrusion detection Host-based intrusion detection is the first area to have been explored in intrusion detection. ...
doi:10.1016/s1389-1286(98)00017-6
fatcat:upa4opx5x5anton56jpls35jqy
An Intrusion Detection Technique Based on Discrete Binary Communication Channels
[chapter]
2011
Intrusion Detection Systems
Depending on where the IDS software is installed, it can be referred to as network based intrusion detection system (NIDS) or host based intrusion detection system (HIDS). ...
This system provides a comprehensive overall assessment of a network, which leads to building broader immunities to help maintain the health of any enterprise network. ...
An Intrusion Detection Technique Based on Discrete Binary Communication Channels, Intrusion Detection Systems, Dr. ...
doi:10.5772/14456
fatcat:srta7ysh6nd63kfxkiwmv4rqaa
Lightweight agents for intrusion detection
2003
Journal of Systems and Software
Our agents travel between monitored systems in a network of distributed systems, obtain information from data cleaning agents, classify and correlate information, and report the information to a user interface ...
We have designed and implemented an intrusion detection system (IDS) prototype based on mobile agents. ...
research articles in refereed journals, conferences and books, and has co-edited three books. He is a co-editor-in-chief of the Journal of Cognitive Systems Research published by Elsevier. ...
doi:10.1016/s0164-1212(02)00092-4
fatcat:syjfwhvlzze4bgvjlyuiuq2hwm
Toward A Network-Assisted Approach for Effective Ransomware Detection
[article]
2020
arXiv
pre-print
The experiment results show that our network-level detection mechanisms are separately applicable to WAN and LAN environments for ransomware detection. ...
In this work, we propose Network-Assisted Approach (NAA), which contains effective local detection and network-level detection mechanisms, to help users determine whether a machine has been infected by ...
Based on such given information, the user can make a judgement about whether this local host is in danger. ...
arXiv:2008.12428v2
fatcat:ynzz4ig75jf5jie7kscvougdrq
Taxonomy and Proposed Architecture of Intrusion Detection and Prevention Systems for Cloud Computing
[chapter]
2012
Lecture Notes in Computer Science
The traditional Intrusion Detection and Prevention Systems (IDPS) are deemed largely inefficient to be deployed in cloud computing environments due to their openness, dynamicity and virtualization in offered ...
This paper surveys and explores the possible solutions to detect and prevent intrusions in cloud computing systems by providing a comprehensive taxonomy of existing IDPS. ...
Host-based (HIDPS) monitors the dynamic behavior and the state of a computer system. ...
doi:10.1007/978-3-642-35362-8_33
fatcat:tmq6ndhbojblfdym6g6lsln5ta
An Agent-Based Intrusion Detection System for Local Area Networks
[article]
2010
arXiv
pre-print
In addition to its ability to detect attacks, the system is capable of identifying and isolating compromised nodes in the network thereby introducing fault-tolerance in its operations. ...
(IDSs) are essential entities to ensure the security of a networked system. ...
Zeng and Guo have proposed an agent-based IDS that can be integrated into the applications of enterprise information systems [24] . ...
arXiv:1011.1531v1
fatcat:y66vnnz4pzcyjog3rpuhwi4bsy
« Previous
Showing results 1 — 15 out of 19,317 results