[[abstract]]In this paper, we propose a dynamic forensics system (DFS) with intrusion tolerance by using Hierarchical Fuzzy Coloured Petri-Nets (HFCPNs), which is utilized to analyze the risk level of the traffic packets received from real server. We improve the intrusion tolerance mechanism [6] by using HFCPNs. When the server is under some threats of intrusion, the malicious packets can be detected by the DFS, and will redirect them to shadow server. By way of using the Coloured Petri Nets and depending on the operator’s experience of fuzzy control, we support more detail design for DFS which can detect more malicious threats than [6]. Therefore, the design of transition will be more flexible for preventing various malicious threats in th...
This paper discusses the design and engineering of a biologically-inspired intrusion detection syste...
The Fuzzy Intrusion Recognition Engine (FIRE) is an anomaly-based intrusion detection system that us...
This paper describes a prototype intelligent intrusion detection system (IIDS) that is being develop...
[[abstract]]In this paper, we propose a dynamic forensics system (DFS) with intrusion tolerance by u...
Abstract—Behavior based intrusion detection technologies are increasingly popular. Traditionally beh...
Network intrusion detection systems (NIDSs) are pattern recognition problems that classify network t...
Master's thesis in Computer scienceIn recent years, network has penetrated into every aspect of our ...
International audienceWeb services provide a general basis of convenient access and operation for cl...
A Network Intrusion Detection System is a network monitoring framework that tries to detect maliciou...
Current intrusion detection techniques mainly focus on discovering abnormal system events in compute...
A Network Intrusion Detection System is a network monitoring framework that tries to detect maliciou...
The virtual area of communication known as cyber space brought about by the debut of the internet ha...
The aim of this article is to present an approach to develop and verify a method of formal modeling ...
In this paper we propose a security system to protect external communications for self-driving and s...
Visual data mining techniques are used to assess which metrics are most effective at detecting diffe...
This paper discusses the design and engineering of a biologically-inspired intrusion detection syste...
The Fuzzy Intrusion Recognition Engine (FIRE) is an anomaly-based intrusion detection system that us...
This paper describes a prototype intelligent intrusion detection system (IIDS) that is being develop...
[[abstract]]In this paper, we propose a dynamic forensics system (DFS) with intrusion tolerance by u...
Abstract—Behavior based intrusion detection technologies are increasingly popular. Traditionally beh...
Network intrusion detection systems (NIDSs) are pattern recognition problems that classify network t...
Master's thesis in Computer scienceIn recent years, network has penetrated into every aspect of our ...
International audienceWeb services provide a general basis of convenient access and operation for cl...
A Network Intrusion Detection System is a network monitoring framework that tries to detect maliciou...
Current intrusion detection techniques mainly focus on discovering abnormal system events in compute...
A Network Intrusion Detection System is a network monitoring framework that tries to detect maliciou...
The virtual area of communication known as cyber space brought about by the debut of the internet ha...
The aim of this article is to present an approach to develop and verify a method of formal modeling ...
In this paper we propose a security system to protect external communications for self-driving and s...
Visual data mining techniques are used to assess which metrics are most effective at detecting diffe...
This paper discusses the design and engineering of a biologically-inspired intrusion detection syste...
The Fuzzy Intrusion Recognition Engine (FIRE) is an anomaly-based intrusion detection system that us...
This paper describes a prototype intelligent intrusion detection system (IIDS) that is being develop...