Intrusion detection systems

Results: 104



#Item
31Modelling to Simulate Botnet Command and Control Protocols for the Evaluation of Network Intrusion Detection Systems. Georges Bossert  Guillaume Hiet

Modelling to Simulate Botnet Command and Control Protocols for the Evaluation of Network Intrusion Detection Systems. Georges Bossert Guillaume Hiet

Add to Reading List

Source URL: www.amossys.fr

Language: French - Date: 2012-07-25 04:28:30
    32

    PDF Document

    Add to Reading List

    Source URL: romisatriawahono.net

    Language: English - Date: 2013-01-23 01:11:11
    33Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems Guofei Gu1 , Prahlad Fogla1 , David Dagon1 , Wenke Lee1 and Boris Skoric2 1  Georgia Institute of Technology, U.S.A.

    Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems Guofei Gu1 , Prahlad Fogla1 , David Dagon1 , Wenke Lee1 and Boris Skoric2 1 Georgia Institute of Technology, U.S.A.

    Add to Reading List

    Source URL: members.home.nl

    Language: English - Date: 2008-12-09 00:54:25
    34A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1  2

    A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1 2

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2008-05-27 17:31:10
    35The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware Matthias Vallentin3 , Robin Sommer2,1 , Jason Lee2 , Craig Leres2 , Vern Paxson1,2, and Brian Tierney2 1 2

    The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware Matthias Vallentin3 , Robin Sommer2,1 , Jason Lee2 , Craig Leres2 , Vern Paxson1,2, and Brian Tierney2 1 2

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2007-06-15 15:22:50
    368 steps to protect your Cisco router Daniel B. Cid  Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Hone

    8 steps to protect your Cisco router Daniel B. Cid Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention systems), and Hone

    Add to Reading List

    Source URL: dcid.me

    Language: English - Date: 2005-02-28 16:38:34
    37Predicting the Resource Consumption of Network Intrusion Detection Systems Holger Dreger1 , Anja Feldmann2, Vern Paxson3,4 , and Robin Sommer4,5 1  Siemens AG, Corporate Technology 2 Deutsche Telekom Labs / TU Berlin 3 U

    Predicting the Resource Consumption of Network Intrusion Detection Systems Holger Dreger1 , Anja Feldmann2, Vern Paxson3,4 , and Robin Sommer4,5 1 Siemens AG, Corporate Technology 2 Deutsche Telekom Labs / TU Berlin 3 U

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2008-06-14 01:31:02
    38NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems

    NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-11-09 09:31:11
    39A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems (Extended Abstract) Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1

    A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems (Extended Abstract) Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2008-05-23 21:17:18
    40Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

    Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

    Add to Reading List

    Source URL: www.icir.org

    Language: English - Date: 2008-01-25 01:06:21