As distributed network intrusion detection systems expand to integrate hundreds and possibly thousands of sensors, managing and presenting the associated sensor data becomes an increasingly complex task. Methods of intelligent data reduction are needed to make sense of the wide dimensional variations. We present a new signal primitive we call conversation exchange dynamics (CED) that accentuates anomalies in traffic flow. This signal provides an aggregated primitive that may be used by intrusion detection systems to base detection strategies upon. Indications of the signal in a variety of simulated and actual anomalous network traffic from distributed sensor collections are presented. Specifically, attacks from the MIT Lawrence Livermore ID...
The goal of this thesis is to familiarize myself, and the reader, with the issues surrounding anomal...
Hostile network traffic is often "different " from benign traffic in ways that can be dist...
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspe...
As distributed network intrusion detection systems expand to integrate hundreds and possibly thousan...
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of...
Abstract:- Distributed network intrusion detection systems which incorporate tens, hundreds, even th...
Abstract:- This paper describes an effort to provide a holistic view of network conversation exchang...
This paper presents a novel network intrusion detection method that searches for frequency patterns ...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
This paper presents a novel network intrusion detection method that searches for frequency patterns ...
Computer crime is a large problem (CSI, 2004; Kabay, 2001a; Kabay, 2001b). Security managers have a ...
Since the early days of research on Intrusion Detection, anomaly-based approaches have been proposed...
The importance of network security has grown tremendously and a number of devices have been introduc...
As the communication industry has connected distant corners of the globe using advances in network ...
ITC/USA 2012 Conference Proceedings / The Forty-Eighth Annual International Telemetering Conference ...
The goal of this thesis is to familiarize myself, and the reader, with the issues surrounding anomal...
Hostile network traffic is often "different " from benign traffic in ways that can be dist...
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspe...
As distributed network intrusion detection systems expand to integrate hundreds and possibly thousan...
Distributed network intrusion detection systems which incorporate tens, hundreds, even thousands, of...
Abstract:- Distributed network intrusion detection systems which incorporate tens, hundreds, even th...
Abstract:- This paper describes an effort to provide a holistic view of network conversation exchang...
This paper presents a novel network intrusion detection method that searches for frequency patterns ...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
This paper presents a novel network intrusion detection method that searches for frequency patterns ...
Computer crime is a large problem (CSI, 2004; Kabay, 2001a; Kabay, 2001b). Security managers have a ...
Since the early days of research on Intrusion Detection, anomaly-based approaches have been proposed...
The importance of network security has grown tremendously and a number of devices have been introduc...
As the communication industry has connected distant corners of the globe using advances in network ...
ITC/USA 2012 Conference Proceedings / The Forty-Eighth Annual International Telemetering Conference ...
The goal of this thesis is to familiarize myself, and the reader, with the issues surrounding anomal...
Hostile network traffic is often "different " from benign traffic in ways that can be dist...
Information systems and their services (referred to as cyberspace) are ubiquitous and touch all aspe...