Filters








9,852 Hits in 4.2 sec

Reasoning about Intrusion Detection Systems for High Speed Networks

Mohsen Rouached
<span title="2012-04-30">2012</span> <i title="Foundation of Computer Science"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/b637noqf3vhmhjevdfk3h5pdsu" style="color: black;">International Journal of Computer Applications</a> </i> &nbsp;
This framework checks that security requirements and assumptions are preserved at run-time by monitoring the satisfaction of EC formulas that formalize them using the detection rules.  ...  To address this problem, Specification-based techniques have been proposed as a promising alternative that combine the strengths of misuse and anomaly detection.  ...  Different approaches have been taken to specify and analyze the intrusion signatures and detection rules [1] [6] [2] primarily for signature-based IDSs.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/6201-8740">doi:10.5120/6201-8740</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/qn3sep2k55gdvaqzojysrwigwu">fatcat:qn3sep2k55gdvaqzojysrwigwu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170815105602/http://www.wseas.us/e-library/conferences/2010/Merida/ISPACT/ISPACT-15.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/d9/2d/d92d593a359a00ebe0e8332658aae8cc8ad068a9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5120/6201-8740"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks [chapter]

Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt
<span title="">2006</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This behavior becomes local detection rules that define a distributed specification-based intrusion detection system aimed at detecting malicious insider nodes.  ...  We describe a formal approach to modeling and reasoning about autoconfiguration protocols to support the detection of malicious insider nodes.  ...  In our approach, formal specifications are used as detection rules in specificationbased intrusion detection.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11679219_3">doi:10.1007/11679219_3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ikixg7arabgg7jrfygsikodrei">fatcat:ikixg7arabgg7jrfygsikodrei</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160824040908/http://web.ntpu.edu.tw:80/~tsengcyt/papers/fast2005.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f1/03/f103576cf47b00f3240aba05272cdec8b270d043.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/11679219_3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

An Efficient Formal Framework for Intrusion Detection Systems

Mohsen Rouached, Hassen Sallay
<span title="">2012</span> <i title="Elsevier BV"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cx3f4s3qmfe6bg4qvuy2cxezyu" style="color: black;">Procedia Computer Science</a> </i> &nbsp;
To address these challenges, this paper proposes to improve the efficiency of the network intrusion detection process by including an Event Calculus based specification to detect the registered and expected  ...  Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse.  ...  For example the signature of the predicate Happens is expressed by Happens : Event × Nat→Bool.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.procs.2012.06.132">doi:10.1016/j.procs.2012.06.132</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/x4lvab4zvjd2tju33am2c6ls2u">fatcat:x4lvab4zvjd2tju33am2c6ls2u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190414072339/https://core.ac.uk/download/pdf/82185071.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b0/4d/b04dac5cb2b72403939ab9badf50ae93658b7e41.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1016/j.procs.2012.06.132"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> elsevier.com </button> </a>

Formal Reasoning About Intrusion Detection Systems [chapter]

Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl Levitt
<span title="">2004</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Intrusion detection is an appealing approach to improving the security of systems. The goal of intrusion detection is to detect attacks with low false positive rate and low false negative rate.  ...  New approach is needed to evaluate the effectiveness of the intrusion detection systems (IDSs). To my wife, Xiaohan Gu, and my daughter, Sophia Song. -iii-Acknowledgments  ...  These detection rules include specifications of a specification-based intrusion detection system and attack signatures of misuse detection systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30143-1_15">doi:10.1007/978-3-540-30143-1_15</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/s3idznmfrbfoxjrjubd7m2leyi">fatcat:s3idznmfrbfoxjrjubd7m2leyi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20121206024102/http://www.cs.ucdavis.edu/research/tech-reports/2007/CSE-2007-13.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/97/bc/97bcaf5ec9e349274608e310146db089974ec9cc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30143-1_15"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Framework for Intrusion Detection Based on Workflow Mining

Nkondock Mi Bahanag Nicolas, Georges Bell Bitjoka, Emvudu Yves
<span title="">2019</span> <i title="Science Publishing Group"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ycj3cvhkonfzno65si4sqprgda" style="color: black;">American Journal of Computer Science and Technology</a> </i> &nbsp;
Nevertheless, these solutions based on signature and behavior approaches of intrusion detection, are more interested in data and have not a global view of processes.  ...  Afterwards, we provide a model of security policy and a model of intrusion detection that enables us to have a low rate of false alerts.  ...  Signature-based Intrusion Detection The signature-based detection technique also known as misuse detection techniques allow in detecting and catching intrusions in terms of the characteristics of known  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11648/j.ajcst.20190202.12">doi:10.11648/j.ajcst.20190202.12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/vict25r24bc2rpqhcrqdcmg5ca">fatcat:vict25r24bc2rpqhcrqdcmg5ca</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200321111608/http://article.ajcst.org/pdf/10.11648.j.ajcst.20190202.12.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/21/4a/214a265847a8c79287b5ff3140f39851ed6ffa48.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.11648/j.ajcst.20190202.12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Temporal Logic Based Framework for Intrusion Detection [chapter]

Prasad Naldurg, Koushik Sen, Prasanna Thati
<span title="">2004</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We propose a framework for intrusion detection that is based on runtime monitoring of temporal logic specifications.  ...  We use an online monitoring algorithm that matches specifications of the absence of an attack, with system execution traces, and raises an alarm whenever the specification is violated.  ...  There are two main approaches to intrusion detection: signature-based [10, 12] and anomaly-based [1, 6, 14] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30232-2_23">doi:10.1007/978-3-540-30232-2_23</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6mkdtviarraj3k2von2gcdmzim">fatcat:6mkdtviarraj3k2von2gcdmzim</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719015352/https://link.springer.com/content/pdf/10.1007%2F978-3-540-30232-2_23.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c1/2a/c12a202add66960a3513eb456a8f3f27ca892b7f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30232-2_23"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Method to Obtain Signatures from Honeypots Data [chapter]

Chi-Hung Chi, Ming Li, Dongxi Liu
<span title="">2004</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Building intrusion detection model in an automatic and online way is worth discussing for timely detecting new attacks.  ...  After formalizing packet structure and syntax of snort rule, we design an algorithm to generate snort rules immediately once it meets critical packets.  ...  Introduction Techniques in an intrusion detection system (IDS) can usually be classified into two. One is anomaly detection and the other misuse detection.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30141-7_61">doi:10.1007/978-3-540-30141-7_61</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gaiqqvxamrhylhgd6owhpszixq">fatcat:gaiqqvxamrhylhgd6owhpszixq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190503092055/https://link.springer.com/content/pdf/10.1007%2F978-3-540-30141-7_61.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/41/40/4140ff6bacd97f1d6e90ab954ebbaba107d2a691.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-540-30141-7_61"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

From Monitoring Templates to Security Monitoring and Threat Detection

Nuno Amálio, George Spanoudakis
<span title="">2008</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/impi66kjjzedhmgysdjktesuwa" style="color: black;">2008 Second International Conference on Emerging Security Information, Systems and Technologies</a> </i> &nbsp;
This paper presents our pattern-based approach to run-time requirements monitoring and threat detection being developed as part of an approach to build frameworks supporting the construction of secure  ...  and dependable systems for ambient intelligence.  ...  ACKNOWLEDGEMENTS This work has been funded by the European commission as part of the project SERENITY (IST-027587). Christos Kloukinas provided useful feedback on this work.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/securware.2008.58">doi:10.1109/securware.2008.58</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/securware/AmalioS08.html">dblp:conf/securware/AmalioS08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kryj4zje5jgxxpqhji6gevvbua">fatcat:kryj4zje5jgxxpqhji6gevvbua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20130723161413/http://www.soi.city.ac.uk/~gespan/securware08.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a3/10/a3107fbde8f3845795dec565885a6ce8072a4be4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/securware.2008.58"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Ontology based intrusion detection system for web application security

Harshal A. Karande, Shyam S. Gupta
<span title="">2015</span> <i title="IEEE"> 2015 International Conference on Communication Networks (ICCN) </i> &nbsp;
Proposed ontological model not only detect HTTP protocol specification attacks but also helps focus only on specific portions of the request and response where a malicious script is possible.  ...  Security system modeled using an ontology propose new class of solution that can be highly effective in detecting zero day and sophisticated web application attacks by capturing the context of the contents  ...  INTRODUCTION Different generic security controls like as signature-based firewalls, intrusion detection and prevention systems and encryption devices have been deployed, however their effectiveness against  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iccn.2015.44">doi:10.1109/iccn.2015.44</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/f3wjlcjw4nh6xa5xpfk2tee2ie">fatcat:f3wjlcjw4nh6xa5xpfk2tee2ie</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180413115153/http://www.ijirt.org/master/publishedpaper/IJIRT101419_PAPER.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/98/14/9814d24db21d77570676c0e200c76b872208fe6f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/iccn.2015.44"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Detecting Anomaly IDS in Network using Bayesian Network

Mrs SumathyMurugan
<span title="">2014</span> <i title="IOSR Journals"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vabuspdninc75epczdurccts4u" style="color: black;">IOSR Journal of Computer Engineering</a> </i> &nbsp;
Intrusion detection is the act of detecting, monitoring unwanted activity and traffic on a network or a device, which violates security policy.  ...  AIDS is a system for detecting computer intrusions, type of misuse that falls out of normal operation by monitoring system activity and classifying it as either normal or anomalous .It is based on Machine  ...  However, and despite the likely inaccuracy in formal signature specifications, the rate of false positives (or FP), events erroneously classified as attacks in anomaly-based systems is usually higher due  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9790/0661-16130107">doi:10.9790/0661-16130107</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rwxcquqcyvddvitofxflbtqs4y">fatcat:rwxcquqcyvddvitofxflbtqs4y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180602000931/http://www.iosrjournals.org/iosr-jce/papers/Vol16-issue1/Version-3/A016130107.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/28/2a/282a57421bf12f0199898c49d0f4c3e845982842.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9790/0661-16130107"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Bridging the Last-Mile Gap in Network Security via Generating Intrusion-Specific Detection Patterns through Machine Learning

Xibin Sun, Du Zhang, Haiou Qin, Jiahua Tang, Kuo-Hui Yeh
<span title="2022-02-12">2022</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/sdme5pnua5auzcsjgqmqefb66m" style="color: black;">Security and Communication Networks</a> </i> &nbsp;
For the specific type of Dos attacks in the KDDCup'99 dataset, we use the LCC-RF-RFEX method to select optimal feature subset and utilize our intrusion-specific approach to generate new rules in Snort  ...  In particular, an LCC-RF-RFEX feature selection approach is proposed to select optimal features of the specific type of attacks from dataset, and then, an intrusion-specific approach is introduced to convert  ...  Acknowledgments is work was supported in part by the grant of 045/2016/A2 and by the grant of 0025/2019/AKP from Macau Science and Technology Foundation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2022/3990386">doi:10.1155/2022/3990386</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3a5ry6k2uzfk5o6motlbhpz2yq">fatcat:3a5ry6k2uzfk5o6motlbhpz2yq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220423095554/https://downloads.hindawi.com/journals/scn/2022/3990386.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b1/ec/b1eca3f21dbe9ab610c1722d691d5b0f8a0965cb.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2022/3990386"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Attacks Detection Based on IP and TCP Protocols Violation

Norma Gomes, Luiz Mattos
<span title="">2006</span> <i title="ABEAT - Associacao Brasileira de Especialistas em Alta Tecnologia"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vjwkwgwcrjcgjdi4si7gtxrstq" style="color: black;">The International Journal of Forensic Computer Science</a> </i> &nbsp;
One of the biggest challenges in the network intrusion detection field is the limitation imposed by the use of well-known attack signatures that disable the previous detection of new attacks.  ...  This work presents a packet analysis methodology for detecting anomalous behaviors, not based on attack signatures, but on verifying whether the network protocols are being violated, and on the content  ...  Most of the IDS infrastructure is based on attack signatures, which detect intrusions, analyze their behaviors and generate attack-descriptive rules.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5769/j200601007">doi:10.5769/j200601007</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/lypfn7wqcfgjxef5kkx3csxbpe">fatcat:lypfn7wqcfgjxef5kkx3csxbpe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829094325/http://ijofcs.org/V01N1-P07%20-%20Attacks%20Detection%20Based%20on%20IP%20and%20TCP.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f7/3a/f73ab9b47968ec24d0e55cdf8285f5fadb9c6777.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5769/j200601007"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Modelling distributed network attacks with constraints

Pedro Salgueiro, Salvador Abreu
<span title="">2013</span> <i title="Inderscience Publishers"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zo45pyiagrbyjfe23g3htd6jhq" style="color: black;">International Journal of Bio-Inspired Computation (IJBIC)</a> </i> &nbsp;
to perform the detection of the specific intrusions.  ...  NeMODe is a declarative system for computer network intrusion detection, providing a declarative domain specific language for describing network intrusion signatures which can span several network packets  ...  Listing 4 represents a formal representation of such clauses, where x represents the number of network packets in the network traffic and n the number of network packets used to model the intrusion signature  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1504/ijbic.2013.055449">doi:10.1504/ijbic.2013.055449</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/l4xvsaplqzfrhdq6xniyx2szaq">fatcat:l4xvsaplqzfrhdq6xniyx2szaq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721022700/http://dspace.uevora.pt/rdpc/bitstream/10174/13852/1/ijbic2013.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/be/be/bebe55cd0f7d1bde1d5e4d4e9f28df60ee6d2a8c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1504/ijbic.2013.055449"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Investigating False Positive Reduction in HTTP via Procedure Analysis

A.A Abimbola, J.M Munoz, W.J Buchanan
<span title="">2006</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/s2vidq2ue5aade7hjdhjpeg5mq" style="color: black;">International conference on Networking and Services (ICNS&#39;06)</a> </i> &nbsp;
First, the merits and demerits of research work in curbing false positive rate of attacks in Intrusion Detection Systems (IDSs) are discussed.  ...  Then we present our research efforts in the form of an IDS called NetHost-Sensor, recap on past NetHost-Sensor research contributions and discuss in detail its novel procedure analysis technique in curbing  ...  Also, these intrusive signatures are normally specific to pattern matching variant of similar attacks [3] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icns.2006.65">doi:10.1109/icns.2006.65</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icns/AbimbolaMB06.html">dblp:conf/icns/AbimbolaMB06</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zvozbdh7lfgqrn3232gy4stjiy">fatcat:zvozbdh7lfgqrn3232gy4stjiy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180723045144/https://www.napier.ac.uk/~/media/worktribe/output-244923/016905581pdf.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6d/83/6d8334434128949a69eeca5ae20433861527b19a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icns.2006.65"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes

Kai Hwang, Min Cai, Ying Chen, Min Qin
<span title="">2007</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/okrr6mjegfbtbjrfrxtci54s6i" style="color: black;">IEEE Transactions on Dependable and Secure Computing</a> </i> &nbsp;
HIDS extracts signatures from the output of ADS and adds them into the SNORT signature database for fast and accurate intrusion detection.  ...  This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks  ...  ACKNOWLEDGMENTS The funding support of this work by the US National Science Foundation ITR Grant ACI-0325409 is appreciated.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tdsc.2007.9">doi:10.1109/tdsc.2007.9</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/oqchafjam5c4dadrmck3rkuf4i">fatcat:oqchafjam5c4dadrmck3rkuf4i</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20070801190246/http://gridsec.usc.edu/files/publications/TDSC-0168-1104-HIDS-Jan12-2007.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8d/da/8dda1e4084beb6340b1673a0fb05c7de8cc0f860.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tdsc.2007.9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 9,852 results