• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 50,286
Next 10 →

Table 1: Classification of Intrusion Response Systems

in A Methodology for Using Intelligent Agents to provide Automated Intrusion Response
by Curtis Carver Jr, John M. D. Hill, John R. Surdu, John R. Surdu Member, Udo W. Pooch, Senior Member 2000
"... In PAGE 2: ... II. PREVIOUS WORK In the past seventeen years, there have been a number of intrusion detection and intrusion response tools developed (See Table1 ). The response systems can be categorized as notification systems, manual response systems, or automatic response systems.... ..."
Cited by 11

Table 1 Panorama of intrusion-detection systems

in Towards a Taxonomy of Intrusion-Detection Systems
by Herve Debar, Marc Dacier, Andreas Wespi
"... In PAGE 21: ... It is, however, a costly process, both for transporting the audits and for processing them. 4 Intrusion-detection tools Table1 presents a selection of intrusion-detection tools that wehave encoun- tered and shows a taxonomy of their components. The selection merely illus- trates the notions described in this paper, and implies no judgment of the quality of the tool, product, or method on our part.... In PAGE 22: ...Abbreviations used: ES: expert system;; SA: signature analysis;; PN: Petri net;; STA: state transition analysis;; Stat: statistics;; NN: neural network;; UII: user intent;; HB: host-based, and NB: network-based. Table1 contains more host-based intrusion-detection systems than network- based intrusion-detection systems. However, this is not the trend in intrusion detection, whichistowards network information and protection of the infras- tructure.... In PAGE 22: ... The main reasons for this are probably the ease of installing a network-based tool (no user workstation manipulation re- quired), the performance degradation experienced by systems when an audit is started, and the di culty and cost of managing a large-scale host audit infrastructure. Table1 also shows that, even though manytechniques have been explored for intrusion detection, most commercial products available today implement one and only one technique, and that the majority of the recent ones [23,28,66] use signatures, for two reasons:... ..."

Table 1: Classification of Intrusion Response Systems

in Adaptation Techniques for Intrusion Detection and Intrusion Response Systems
by Daniel Ragsdale, Curtis Carver, Jeffery Humphries, Udo Pooch 2000
Cited by 11

Table 7: Relationship between the network intrusion detection system and the immune system.

in Artificial Immune Systems: Part II -- A Survey of Applications
by Leandro Nunes de Castro, Fernando José von Zuben
"... In PAGE 5: ...etection system (IDS). ...........................................................................................................................................30 Table7 : Relationship between the network intrusion detection system and the immune system. IDS: Intrusion Detection System.... In PAGE 31: ... They also suggested that an overall artificial immune model for network intrusion detection would be comprised by three distinct evolutionary stages: 1) negative selection, 2) clonal selection and 3) gene library evolution. Table7 shows how they related the immune system with their network environment, and Figure 15 presents the physical architecture of their system (IDS corresponds to Intrusion Detection System). The negative selection algorithm with niching simply replaces the random generation of detectors by the evolution of detectors towards non-self.... ..."

Table 1: Panorama of intrusion-detection systems information sources.

in Intrusion-Detection Products and Trends
by Hervé Debar
"... In PAGE 2: ... This paper does not discuss all existing products and vendors o ering intrusion-detection solutions. Information sources Table1 shows the products a number of vendors propose for monitoring multiple information sources. It clearly shows that most vendors associate a host-based and a network-based intrusion-detection product.... ..."

Table 3.1: Intrusion Detection Systems Comparison Table

in Honeypots
by Technische Informatik Und, Reto Baumann, Christian Plattner, Eidgenössische Technische, Hochschule Zürich

Table 2: Criteria for Evaluating Network Intrusion Detection Systems (Wilkison, 2005)

in Word Count: 14,245
by Tich Phuoc Tran, Student Tich, Phuoc Tran, Tich Phuoc Tran, Tich Phuoc Tran

Table 2. The numbers of real intrusion alarms of both systems.

in An intrusion detection model based upon intrusion detection markup language (IDML
by Yao-tsung Lin, Shian-shyong Tseng, Shun-chieh Lin 2001
"... In PAGE 17: ...Through analysis of the results shown in Table2 , the false alarms included in the reports of both systems could be pruned, and the accuracy of these two systems for de- tecting intrusions occurring in the same environment during the same period is shown in Table 3. Table 3.... ..."
Cited by 1

Table 1: Comparison between Intrusion Detection Systems (IDS), Stateless Model (SM) and Application level firewall (FW). The proposed solution is compared to intrusion detection systems and application level firewalls in

in Stateless Model For The Prevention Of
by Malicious Tunnels Abhishek, Abhishek Singh, Ola Nordström, Andre L M Dos Santos, Chenguhai Lu
"... In PAGE 9: ...Table 1: Comparison between Intrusion Detection Systems (IDS), Stateless Model (SM) and Application level firewall (FW). The proposed solution is compared to intrusion detection systems and application level firewalls in Table1 . Intrusion detection system checks the value of each field and raises an alarm in the case of any suspicious content.... In PAGE 9: ... The stateless model defines and enforces a value for idle fields. It is possible to see in Table1 that the stateless model provides advantages over intrusion detection systems and firewalls in most cases. The stateless model can filter encrypted payload, allows protocols to be used freely and is computationally inexpensive.... ..."

Table 6: Components of the immune system that satisfy the requirements for the development of an efficient intrusion detection system (IDS). Characteristic of an IDS Immune System

in Artificial Immune Systems: Part II -- A Survey of Applications
by Leandro Nunes de Castro, Fernando José von Zuben
"... In PAGE 5: ...able 5: Relationship between the biological immune system and the proposed neural network model.........................21 Table6 : Components of the immune system that satisfy the requirements for the development of an efficient intrusion detection system (IDS).... In PAGE 30: ... Upon their analysis, they identified three fundamental requirements for the derivation of the design goals for network-based intrusion detection, named distribution, self-organization and being lightweight. Table6 describes the immune system components and functions that satisfy the... ..."
Next 10 →
Results 1 - 10 of 50,286
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University