Defending against distributed denial of service attacks: issues and challenges

BB Gupta, RC Joshi, M Misra - Information Security Journal: A …, 2009 - Taylor & Francis
ABSTRACT Distributed Denial of Service (DDoS) attacks on user machines, organizations,
and infrastructures of the Internet have become highly publicized incidents and call for …

Packet sampling flow-based detection of network intrusions

JA Copeland, J Jerrim - US Patent 7,512,980, 2009 - Google Patents
A flow-based intrusion detection system for detecting intrusions in computer communication
networks. Data packets representing communications between hosts in a computer-to …

Intrusion detection for grid and cloud computing

K Vieira, A Schulter, C Westphall, C Westphall - It Professional, 2009 - ieeexplore.ieee.org
Providing security in a distributed system requires more than user authentication with
passwords or digital certificates and confidentiality in data transmission. The Grid and Cloud …

Flow-based detection of network intrusions

JA Copeland III - US Patent 7,475,426, 2009 - Google Patents
- Y flow that appears Suspicious and adding that value to the total concern index of the
responsible host, it is possible to identify hosts that are engaged in intrusion activity. When …

Dynamic policy-based IDS configuration

Q Zhu, T Başar - Proceedings of the 48h IEEE Conference on …, 2009 - ieeexplore.ieee.org
Intrusion Detection System (IDS) is an important security enforcement tool in modern
networked information systems. Obtaining an optimal IDS configuration for effective …

Multiagent systems for network intrusion detection: A review

Á Herrero, E Corchado - … Intelligence in Security for Information Systems …, 2009 - Springer
Abstract More and more, Intrusion Detection Systems (IDSs) are seen as an important
component in comprehensive security solutions. Thus, IDSs are common elements in …

[PDF][PDF] Методы обнаружения вторжений и аномалий функционирования киберсистем

СА ПЕТРЕНКО - Труды Института системного анализа Российской …, 2009 - isa.ru
Термин «обнаружение вторжений» впервые появился в работах американских ученых
Д. Андерсона и Д. Деннинг в 1980-е гг. Несмотря на достаточно большое количество …

Using artificial neural networks to detect unknown computer worms

D Stopel, R Moskovitch, Z Boger, Y Shahar… - Neural Computing and …, 2009 - Springer
Detecting computer worms is a highly challenging task. We present a new approach that
uses artificial neural networks (ANN) to detect the presence of computer worms based on …

Generalized discriminant analysis algorithm for feature reduction in cyber attack detection system

S Singh, S Silakari - arXiv preprint arXiv:0911.0787, 2009 - arxiv.org
This Generalized Discriminant Analysis (GDA) has provided an extremely powerful
approach to extracting non linear features. The network traffic data provided for the design of …

Exploiting diversity and correlation to improve the performance of intrusion detection systems

L Coppolino, L Romano, S D'Antonio… - … on Network and …, 2009 - ieeexplore.ieee.org
Intrusion detection systems (IDSs) are one of the most widely used technologies for
computer security. Regrettably, current solutions are far from perfect, since they either …