Agent-based honeynet framework for protecting servers in campus networks

IS Kim, MH Kim - IET Information Security, 2012 - IET
Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs) that use
signatures cannot protect servers from new types of internet worms. Therefore it is important …

Improving the resilience of an IDS against performance throttling attacks

GS Shenoy, J Tubella, A González - International Conference on Security …, 2012 - Springer
Abstract Intrusion Detection Systems (IDS) have emerged as one of the most promising
ways to secure systems in the network. To be effective against evasion attempts, the IDS …

Improving the performance efficiency of an ids by exploiting temporal locality in network traffic

GS Shenoy, J Tubella, A Gonz'lez - 2012 IEEE 20th …, 2012 - ieeexplore.ieee.org
Network traffic has traditionally exhibited temporal locality in the header field of packets.
Such locality is intuitive and is a consequence of the semantics of network protocols …

Work in progress: Examination of student experiences in immersive vs. traditional group projects

I Bojanova - 2012 Frontiers in Education Conference …, 2012 - ieeexplore.ieee.org
Group projects are essential for graduate level programs. This paper presents a study on
student experiences from immersive and traditional online group projects. The study …

Multipurpose Network Monitoring Platform Using Dynamic Address Assignment

M Eto, D Inoue, M Suzuki… - 2012 Seventh Asia Joint …, 2012 - ieeexplore.ieee.org
There have been a number of network monitoring projects launched to cope with cyber
threats in the Internet. In those projects, several types of sensors such as black hole sensor …

Architecture support for intrusion detection systems

G Sreekar Shenoy - 2012 - upcommons.upc.edu
System security is a prerequisite for efficient day-to-day transactions. As a consequence,
Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to …

Architecture support for intrusion detection systems

GS Shenoy - 2012 - dialnet.unirioja.es
System security is a prerequisite for efficient day-to-day transactions. As a consequence,
Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to …