Network intrusion detection using MDL compress for deep packet inspection

EE Eiland, SC Evans, JD Impson, TS Markham… - US Patent …, 2012 - Google Patents
This application is directed to an invention (s) that was made as a result of activities
undertaken within the scope of a Joint Research Agreement made between Lockheed …

[PDF][PDF] Network based intrusion detection and prevention systems: Attack classification, methodologies and tools

N Harale, BB Meshram - International Journal of Engineering And …, 2016 - academia.edu
Complex and common security attackshave become a common issue nowadays. Success
rate of detecting these attacks through existing tools seems to be decreasing due to simple …

[PDF][PDF] Network intrusion detection and prevention techniques for DoS attacks

S Patil, BB Meshram - International Journal of Scientific and Research …, 2012 - Citeseer
The Intrusion prevention system is the extension of Intrusion detection system. Network
Intrusion Detection and Prevention system works on analyzing the packets coming and …

Implementation of an incremental MDL-based two part compression algorithm for model inference

TS Markham, SC Evans, J Impson… - 2009 Data …, 2009 - ieeexplore.ieee.org
We describe the implementation and performance of a compression-based model inference
engine, MDLcompress. The MDL-based compression produces a two part code of the …

Towards modeling and detection of polymorphic network attacks using grammar based learning with Support Vector Machines

SC Evans, W Yan, BJ Scholz, B Barnett… - MILCOM 2009-2009 …, 2009 - ieeexplore.ieee.org
Polymorphic attacks threaten to make many intrusion detection schemes ineffective [15]. In
order to address the threat of advanced attacks, model based techniques are required. In …

Multi-packet & multi-session signature detection using state based model

PS Pawar, MP Singh… - 2010 IEEE 2nd …, 2010 - ieeexplore.ieee.org
Signature Detection modules in IDS/IPS though accurate in pattern matching, yet it leads to
false positives. This is due to the incompleteness of the signatures which lacks or has very …

Evaluating the Availability of Forensic Evidence from Three IDSs: Tool Ability

E Alsaiari - 2016 - openrepository.aut.ac.nz
There is a risk whenever we use networks, computer systems and Internet technologies that
things will go wrong and we need protection in our daily lives. Thus, in many communication …