Immune system approaches to intrusion detection–a review

U Aickelin, J Greensmith, J Twycross - … Sicily, Italy, September 13-16, 2004 …, 2004 - Springer
The use of artificial immune systems in intrusion detection is an appealing concept for two
reasons. Firstly, the human immune system provides the human body with a high level of …

An overview of artificial immune systems

J Timmis, T Knight, LN de Castro, E Hart - Computation in cells and …, 2004 - Springer
The immune system is highly distributed, highly adaptive, self-organising in nature,
maintains a memory of past encounters and has the ability to continually learn about new …

User re-authentication via mouse movements

M Pusara, CE Brodley - Proceedings of the 2004 ACM workshop on …, 2004 - dl.acm.org
We present an approach to user re-authentication based on the data collected from the
computer's mouse device. Our underlying hypothesis is that one can successfully model …

[图书][B] Path-based failure and evolution management

YYM Chen - 2004 - search.proquest.com
This dissertation presents a new approach to managing failures and evolution in large,
complex distributed systems using runtime paths. We use the paths that requests follow as …

Adaptive distributed firewall using intrusion detection

LK Strand - 2004 - duo.uio.no
Conventional firewalls rely on a strict outside/inside topology where the gateway (s) enforce
some sort of traffic filtering. Some claims that with the evolving connectivity of the Internet …

A formal framework for positive and negative detection schemes

F Esponda, S Forrest, P Helman - IEEE Transactions on …, 2004 - ieeexplore.ieee.org
In anomaly detection, the normal behavior of a process is characterized by a model, and
deviations from the model are called anomalies. In behavior-based approaches to anomaly …

[PDF][PDF] Ostia: A Delegating Architecture for Secure System Call Interposition.

T Garfinkel, B Pfaff, M Rosenblum - NDSS, 2004 - 66.246.76.178
Application sandboxes provide restricted execution environments that limit an application's
access to sensitive OS resources. These systems are an increasingly popular method for …

[PDF][PDF] Efficient Context-Sensitive Intrusion Detection.

JT Giffin, S Jha, BP Miller - NDSS, 2004 - academia.edu
Abstract Model-based intrusion detection compares a process's execution against a
program model to detect intrusion attempts. Models constructed from static program analysis …

Reversible sketches for efficient and accurate change detection over network data streams

R Schweller, A Gupta, E Parsons, Y Chen - Proceedings of the 4th ACM …, 2004 - dl.acm.org
Traffic anomalies such as failures and attacks are increasing in frequency and severity, and
thus identifying them rapidly and accurately is critical for large network operators. The …

Formalizing sensitivity in static analysis for intrusion detection

HH Feng, JT Giffin, Y Huang, S Jha… - IEEE Symposium on …, 2004 - ieeexplore.ieee.org
A key function of a host-based intrusion detection system is to monitor program execution.
Models constructed using static analysis have the highly desirable feature that they do not …