The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The effect of advances in the fields of ubiquitous computing, wireless communications and embedded system design has seen a corresponding rapid improvement of wireless sensor technology. Sensor networks have emerged as a platform for deployment and sustenance of critical applications that require real-time sensing and data acquisition for decision-making purposes. A significant number of malicious...
Intrusion detection systems (IDS) and intrusion prevention systems (IPS) are now considered a mainstream security technology. IDS and IPS are designed to identify security breaches. However, one of the most important problems with current IDS and IPS is the lack of the ldquoenvironmental awarenessrdquo (i.e. security policy, network topology and software). This ignorance triggers many false positives...
An artificial immune system (ARTIS) enlightened by the biological immune system is emerging as a new field of computation intelligence research. At present, it showed us many properties after the research to the immune system, including distributed computation, self-organization and lightweight, which were discovered to meet the requests of ARTIS. So the Immunology applied to the intrusion detection...
Protecting computer networks from accidental and malicious harm is a critical issue. Researchers have sought a variety of solutions ranging from the purely statistical approach to approaches inspired from a variety of fields such as economics and biology. In this paper, we focus on the issue of intruder detection and propose two complementary approaches, one economics-based, the other biology-inspired...
This paper presents a taxonomy of anomaly detection techniques that is then used to survey and classify a number of research prototypes and commercial products. Commercial products and solutions based anomaly detection techniques are beginning to establish themselves in mainstream security solutions alongside firewalls, intrusion prevention systems and network monitoring solutions. These solutions...
In this paper, we study the problem of anomaly detection in high-dimensional network streams. We have developed a new technique, called Stream Projected Outlier deTector (SPOT), to deal with the problem of anomaly detection from high-dimensional data streams. We conduct a case study of SPOT in this paper by deploying it on 1999 KDD Intrusion Detection application. Innovative approaches for training...
While a considerable amount of research has been done for detecting the binary worms exploiting the vulnerability of buffer overflow, very little effort has been spent in detecting worms that consist of only text, Le., printable ASCII characters. We show that the existing worm detectors often either do not examine the ASCII stream or are not well suited to efficiently detect worms in the ASCII stream...
In this paper we analyze network immunity as a bio-inspired approach for detecting anomalies in communication networks. We briefly review the basic methods of artificial immune systems (AIS), identify their strengths and weaknesses, and evaluate their possible applications to intrusion detection in computer networks. After an overview of related work from the area of intrusion detection we collect...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.