Keeping computer networks safe from attack requires ever-increasing vigilance. Our work on applying locality to network intrusion detection is presented in this dissertation. Network servers that allow connections from both the internal network and the Internet are vulnerable to attack from all sides. Analysis of the behavior of incoming connections for properties of locality can be used to create a normal profile for such network servers. Intrusions can then be detected due to their abnormal behavior. Data was collected from a typical network server both under normal conditions and under specific attacks. Experiments show that connections to the server do in fact exhibit locality, and attacks on the server can be detected through their vio...
In this paper we introduce the concepts of Logical and Physical Network Locality and point out thei...
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility...
In computer systems and computer networks, security is a research area in constant evolution. Ever s...
Keeping computer networks safe from attack requires ever-increasing vigilance. Our work on applying ...
Detection of intrusion on network servers plays an ever more important role in network security. Thi...
Detection of intrusion on network servers plays an ever more important role in network security. Thi...
Ourmon is a near real-time network monitoring and anomaly detection system that captures packets usi...
While a firewall at the perimeter of a local network provides the first line of defense against atta...
After many research efforts, Network Intrusion Detection Systems still have much room for improvemen...
After many research efforts, Network Intrusion Detection Systems still have much room for improvemen...
Network security is still at its infancy. Existing intrusion detection and prevention solutions lack...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
none5noAfter many research efforts, Network Intrusion Detection Systems still have much room for imp...
a suite of data mining techniques to automatically detect attacks against computer net-works and sys...
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility...
In this paper we introduce the concepts of Logical and Physical Network Locality and point out thei...
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility...
In computer systems and computer networks, security is a research area in constant evolution. Ever s...
Keeping computer networks safe from attack requires ever-increasing vigilance. Our work on applying ...
Detection of intrusion on network servers plays an ever more important role in network security. Thi...
Detection of intrusion on network servers plays an ever more important role in network security. Thi...
Ourmon is a near real-time network monitoring and anomaly detection system that captures packets usi...
While a firewall at the perimeter of a local network provides the first line of defense against atta...
After many research efforts, Network Intrusion Detection Systems still have much room for improvemen...
After many research efforts, Network Intrusion Detection Systems still have much room for improvemen...
Network security is still at its infancy. Existing intrusion detection and prevention solutions lack...
Abstract: New datamining techniques are developed for generating frequent episode rules of traffic e...
none5noAfter many research efforts, Network Intrusion Detection Systems still have much room for imp...
a suite of data mining techniques to automatically detect attacks against computer net-works and sys...
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility...
In this paper we introduce the concepts of Logical and Physical Network Locality and point out thei...
Inter and intra-network connectivity have become a useful resource for accessibility and flexibility...
In computer systems and computer networks, security is a research area in constant evolution. Ever s...