[PDF][PDF] An overview of flow-based and packet-based intrusion detection performance in high speed networks

H Alaidaros, M Mahmuddin, A Al Mazari - Proceedings of the …, 2011 - academia.edu
Network Intrusion Detection Systems (NIDSs) are widely-deployed security tools for
detecting cyber-attacks and activities conducted by intruders for observing network traffics …

Network port profiling

JA Copeland III - US Patent 7,886,358, 2011 - Google Patents
This patent application also claims priority to the US provisional patent application Ser. No.
60/265,194 entitled “The Use of Flows to Analyze Network Traffic'filed on Jan. 31, 2001 …

Secure multi-party sorting and applications

KV Jönsson, G Kreitz, M Uddin - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Sorting is among the most fundamental and well-studied problems within computer science
and a core step of many algorithms. In this article, we consider the problem of constructing a …

DoubleGuard: Detecting intrusions in multitier web applications

M Le, A Stavrou, BBH Kang - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Internet services and applications have become an inextricable part of daily life, enabling
communication and the management of personal information from anywhere. To …

Exploring discrepancies in findings obtained with the KDD Cup'99 data set

V Engen, J Vincent, K Phalp - Intelligent Data Analysis, 2011 - content.iospress.com
The KDD Cup'99 data set has been widely used to evaluate intrusion detection prototypes,
most based on machine learning techniques, for nearly a decade. The data set served well …

Method and system for responding to a computer intrusion

PT Baffes, JM Garrison, M Gilfix, A Hsu… - US Patent …, 2011 - Google Patents
A method and system for managing an intrusion on a computer by graphically representing
an intrusion pattern of a known past intrusion, and then comparing the intrusion pattern of …

Visual analytics for maritime anomaly detection

MJ Riveiro - 2011 - diva-portal.org
The surveillance of large sea areas typically involves the analysis of huge quantities of
heterogeneous data. In order to support the operator while monitoring maritime traffic, the …

Self-adaptive authorization framework for policy based RBAC/ABAC models

C Bailey, DW Chadwick… - 2011 IEEE Ninth …, 2011 - ieeexplore.ieee.org
Authorization systems are an integral part of any network where resources need to be
protected. They act as the gateway for providing (or denying) subjects (users) access to …

Bi-layer behavioral-based feature selection approach for network intrusion classification

HF Eid, MA Salama, AE Hassanien, T Kim - … SecTech 2011, Held as Part of …, 2011 - Springer
Feature selection is a preprocessing step to machine learning, used to reduce the
dimensionality of the dataset by removing irrelevant data. Variety of feature selection …

[PDF][PDF] Building scalable distributed intrusion detection systems based on the mapreduce framework

MD Holtz, BM David, RT de Sousa Júnior - Revista Telecommun, 2011 - academia.edu
Intrusion detection systems (IDS) are essential components in a secure network
environment, allowing for early detection of malicious activities and attacks. By employing …