J Navarro, A Deruyver, P Parrend - Computers & Security, 2018 - Elsevier
Since the beginning of the Internet, cyberattacks have threatened users and organisations. They have become more complex concurrently with computer networks. Nowadays …
R Sadoddin, A Ghorbani - … of the 2006 international conference on …, 2006 - dl.acm.org
Managing raw alerts generated by various sensors are becoming of more significance to intrusion detection systems as more sensors with different capabilities are distributed …
This paper is focused on detecting and analyzing the Distributed Denial of Service (DDoS) attacks in cloud computing environments. This type of attacks is often the source of cloud …
During the last decade, various machine learning and data mining techniques have been applied to Intrusion Detection Systems (IDSs) which have played an important role in …
E Zimiles - US Patent App. 12/350,161, 2009 - Google Patents
0001. The present application claims the priority of US Provisional Application Ser. No. 61/006,342 filed Jan. 7, 2008, and US Provisional Application Ser. No. 61/136,937 filed Oct …
D Yu, D Frincke - Proceedings of the 43rd annual Southeast regional …, 2005 - dl.acm.org
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources such as …
Intrusion analysis and incident management remains a difficult problem in practical network security defense. The root cause of this problem is the large rate of false positives in the …
D Yu, D Frincke - Computer Networks, 2007 - Elsevier
Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder's next likely goal. In this …
Intrusion analysis, ie, the process of combing through IDS alerts and audit logs to identify real successful and attempted attacks, remains a difficult problem in practical network …