This thesis describes the development and evaluation of a novel system called the Network Attack Characterization Tool (NACT). The NACT employs digital signal processing to detect network intrusions, by exploiting the Lomb-Scargle periodogram method to obtain a spectrum for sampled network traffic. The Lomb-Scargle method for generating a periodogram allows for the processing of unevenly sampled network data. This method for determining a periodogram has not yet been used for intrusion detection. The spectrum is examined to determine if features exist above a significance level chosen by the user. These features are considered an attack, triggering an alarm. Two traffic statistics are used to construct the time series over which the periodo...
Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually w...
In the last decade, the network has grown both in size and importance. In particular TCP/IP network ...
This report discusses the research done on the chosen topic, which is Network Intrusion Detection Sy...
Computer security has not kept pace with the rapid growth of networked systems. Through its connecti...
As advances in the networking technology help to connect distant corners of the globe and as the Int...
Attacks detection and visualization is the process of attempting to identify instances of network mi...
The United States Air Force extensively uses information systems as a tool managing and maintaining ...
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
This paper presents a novel network intrusion detection method that searches for frequency patterns ...
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and...
The article considers the methods that affect the operation of the intrusion detection system. Using...
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and...
Modem network security products vary greatly in their underlying technology and architecture. Since ...
This paper presents a novel network intrusion detection method that searches for frequency patterns ...
Network-based attacks against computer systems are a common and increasing problem. Attackers contin...
Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually w...
In the last decade, the network has grown both in size and importance. In particular TCP/IP network ...
This report discusses the research done on the chosen topic, which is Network Intrusion Detection Sy...
Computer security has not kept pace with the rapid growth of networked systems. Through its connecti...
As advances in the networking technology help to connect distant corners of the globe and as the Int...
Attacks detection and visualization is the process of attempting to identify instances of network mi...
The United States Air Force extensively uses information systems as a tool managing and maintaining ...
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
This paper presents a novel network intrusion detection method that searches for frequency patterns ...
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and...
The article considers the methods that affect the operation of the intrusion detection system. Using...
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and...
Modem network security products vary greatly in their underlying technology and architecture. Since ...
This paper presents a novel network intrusion detection method that searches for frequency patterns ...
Network-based attacks against computer systems are a common and increasing problem. Attackers contin...
Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually w...
In the last decade, the network has grown both in size and importance. In particular TCP/IP network ...
This report discusses the research done on the chosen topic, which is Network Intrusion Detection Sy...