Network intrusion detection

B Mukherjee, LT Heberlein, KN Levitt - IEEE network, 1994 - ieeexplore.ieee.org
Intrusion detection is a new, retrofit approach for providing a sense of security in existing
computers and data networks, while allowing them to operate in their current" open" mode …

[PDF][PDF] Techniques for cyber attack attribution

DA Wheeler, GN Larsen - Institute for Defense Analysis, 2003 - researchgate.net
This document was prepared by the Institute for Defense Analyses (IDA) under the task
order, Computer Network Defense Assessment, in response to a task objective, to “provide …

A visualization paradigm for network intrusion detection

Y Livnat, J Agutter, S Moon… - Proceedings from the …, 2005 - ieeexplore.ieee.org
We present a novel paradigm for visual correlation of network alerts from disparate logs.
This paradigm facilitates and promotes situational awareness in complex network …

[图书][B] Integrating artificial immune algorithms for intrusion detection

JW Kim - 2002 - search.proquest.com
This thesis focuses on the combination of a set of artificial immune algorithms and their
application to intrusion detection. Three evolutionary algorithms are investigated, each …

DIDMA: A distributed intrusion detection system using mobile agents

P Kannadiga, M Zulkernine - Sixth International Conference on …, 2005 - ieeexplore.ieee.org
The widespread proliferation of Internet connections has made current computer networks
more vulnerable to intrusions than before. In network intrusions, there may be multiple …

Achieving privacy preservation and billing via delayed information release

C Hu, X Cheng, Z Tian, J Yu… - IEEE/ACM Transactions on …, 2021 - ieeexplore.ieee.org
Many applications such as smart metering and location based services pose strong privacy
requirements but achieving privacy protection at the client side is a non-trial problem as …

[PDF][PDF] Languages and tools for rule-based distributed intrusion detection

A Mounji - 1997 - researchgate.net
Computers and network computers of today's organizations and academia are increasingly
becoming the targets of computer crimes which can result in loss of productivity, competitive …

A distributed autonomous-agent network-intrusion detection and response system

J Barrus, NC Rowe - Proceedings of the Command and Control …, 1998 - apps.dtic.mil
We propose a distributed architecture with autonomous agents to monitor security-related
activity within a network. Each agent operates cooperatively yet independently of the others …

[PDF][PDF] Execution Monitoring of security-critical programs in a distributed system: a specification-based approach

CCW Ko - 1996 - seclab.cs.ucdavis.edu
As computer systems are used increasingly for processing critical information and
performing critical jobs, our society heavily depends on the secure operation of these …

A survey of accountability in computer networks and distributed systems

Z Xiao, N Kathiresshan, Y Xiao - security and communication …, 2016 - Wiley Online Library
Security in computer systems has been a major concern since the very beginning. Although
security has been addressed in various aspects, accountability is one of the main facets of …