• Autograph

  • Referenced in 16 articles [sw23929]
  • worm signature detection. Today’s Internet intrusion detection systems (IDSes) monitor edge networks’ DMZs...
  • Polygraph

  • Referenced in 17 articles [sw23932]
  • widely believed that content-signature-based intrusion detection systems (IDS) are easily evaded by polymorphic...
  • ADAM

  • Referenced in 7 articles [sw34891]
  • data mining in intrusion detection. Intrusion detection systems have traditionally been based on the characterization ... matches that characterization. Recently, new intrusion detection systems based on data mining are making their ... data mining techniques can be in intrusion detection...
  • RRE

  • Referenced in 9 articles [sw22305]
  • face of fast-spreading intrusions requires advances not only in detection algorithms, but also ... addition, RRE accounts for uncertainties in intrusion detection alert notifications. RRE then chooses optimal response...
  • Gnort

  • Referenced in 5 articles [sw14147]
  • Gnort: High performance network intrusion detection using graphics processors. The constant increase in link speeds ... threats poses challenges to network intrusion detection systems (NIDS), which must cope with higher traffic ... this paper, we present an intrusion detection system based on the Snort open-source NIDS ... used effectively to speed up intrusion detection systems, as well as other systems that involve...
  • FSMRDE

  • Referenced in 7 articles [sw22250]
  • FSMRDE, we apply it to intrusion detection and other application domains. Experimental results show that...
  • ADEPTS

  • Referenced in 4 articles [sw22315]
  • potential financial impact. Compared to intrusion detection, automated response has received relatively less attention ... design of automated response mechanisms in an intrusion tolerant system called ADEPTS. Our focus ... response to alerts from an intrusion detection framework, ADEPTS executes algorithms to determine the spread...
  • D-SCIDS

  • Referenced in 3 articles [sw29719]
  • SCIDS: distributed soft computing intrusion detection system. An Intrusion Detection System (IDS) is a program ... three fuzzy rule-based classifiers to detect intrusions in a network. Results are then compared ... could play a major role for intrusion detection...
  • eHIP

  • Referenced in 4 articles [sw01490]
  • eHIP) system, combines intrusion prevention with intrusion detection to provide an energy-efficient and secure ... eHIP system consists of Authentication-based Intrusion ... Prevention (AIP) subsystem and Collaboration-based Intrusion Detection (CID) subsystem. Both subsystems provide heterogeneous mechanisms...
  • Orchids

  • Referenced in 3 articles [sw09807]
  • Orchids intrusion detection tool. Orchids is an intrusion detection tool based on techniques for fast ... temporal logic tailored to the description of intrusion signatures. They are checked against merged network...
  • Rishi

  • Referenced in 2 articles [sw21756]
  • commonly not detected by classical intrusion detection systems. Upon detection, it is possible to determine ... GBit network of RWTH Aachen university, we detected 82 bot-infected machines within two weeks ... channels not picked up by other intrusion detection systems...
  • NFIDS

  • Referenced in 1 article [sw34890]
  • NFIDS: a neuro-fuzzy intrusion detection system. Heavy reliance on the Internet and worldwide connectivity ... build a system with no vulnerabilities, intrusion detection has become an important area of research ... neuro-fuzzy intrusion detection system (NFIDS) is an anomaly based intrusion detection system that uses...
  • ZIDS

  • Referenced in 1 article [sw33563]
  • ZIDS: A privacy-preserving intrusion detection system using secure two-party computation protocols. We introduce ... client-server solution for private detection of intrusions that is suitable for private detection ... input data. The system includes an intrusion detection system (IDS) server that ... this problem, we reduce privacy-preserving intrusion detection to an instance of secure two-party...
  • HMMPayl

  • Referenced in 1 article [sw17494]
  • HMMPayl: An intrusion detection system based on hidden Markov models. Nowadays the security...
  • CARRADS

  • Referenced in 1 article [sw00106]
  • transient. Thus, dynamically adapting the routing attack detection system at real-time to new attacks ... computationally efficient methodology for adapting the intrusion detection model at real-time. The adaptation process...
  • LibCVM

  • Referenced in 1 article [sw18879]
  • large range of problems, including network intrusion detection, face detection and implicit surface modeling...
  • SNORTRAN

  • Referenced in 1 article [sw13064]
  • Snortran is an optimizing compiler for intrusion detection rules popularized by an open-source Snort...
  • MERGEXPLAIN

  • Referenced in 1 article [sw24976]
  • paper we propose MERGEXPLAIN, a non-intrusive conflict detection algorithm which implements a divide...
  • TACO

  • Referenced in 3 articles [sw10169]
  • functions and suffixes and do not require intrusive changes to the AMPL language standard ... Optimization that reads AMPLurl{stub.nl} files and detects the structure of the optimal control problem...
  • JudoSTM

  • Referenced in 4 articles [sw25471]
  • limited to either managed languages or intrusive APIs. Furthermore, transactions in STMs cannot normally contain ... code. Furthermore, by using value-based conflict detection, JudoSTM additionally supports the transactional execution...