Network intrusion detection system

Results: 247



#Item
131Software / ACARM-ng / Computer network security / Intrusion detection system / System software

In this real-world case study presentation you will see how scripting was used to generate an actionable report based on the IDS alerts causing the most problems. This scripting enabled our organization to make the most

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 18:45:05
132Security / Intrusion detection system / Anomaly detection / Anomaly-based intrusion detection system / Snort / Network intrusion detection system / Burglar alarm / Network security / Malware / Computer network security / System software / Software

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection DAY, David and FLORES, Denys Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/5246/

Add to Reading List

Source URL: shura.shu.ac.uk

Language: English - Date: 2013-08-01 09:17:33
133Intrusion detection systems / Computer security / Multi-agent systems / Intrusion prevention system / Network intrusion detection system / Host-based intrusion detection system / Anomaly detection / Botnet / Antivirus software / Computer network security / System software / Computing

Microsoft Word - aaai_final.doc

Add to Reading List

Source URL: www.aaai.org

Language: English - Date: 2008-03-11 15:26:12
134Traffic flow / Denial-of-service attack / Anomaly detection / Transmission Control Protocol / OSI protocols / Computer network security / Computing / Intrusion detection system

Network Anomaly Detection Using Autonomous System Flow Aggregates To appear, GLOBECOM[removed]Draft version Thienne Johnson and Loukas Lazos Department of Electrical and Computer Engineering University of Arizona, Tucson,

Add to Reading List

Source URL: netvue.cs.arizona.edu

Language: English - Date: 2014-10-16 13:25:04
135Cyberwarfare / Software testing / Credit cards / Computer network security / Automated teller machine / Payment Card Industry Data Security Standard / Intrusion detection system / Host-based intrusion detection system / Penetration test / Computer security / Payment systems / Technology

Microsoft Word - DataSecurityAlert_ATM CashOut_Jan2013_v1

Add to Reading List

Source URL: krebsonsecurity.com

Language: English - Date: 2013-01-24 14:16:44
136Software / Denial-of-service attack / Snort / Intrusion detection system / Computer network security / Cyberwarfare / Computer security

THE BOOTSTRAP OF MULTIPLE REGRESSION COEFFICIENT ESTIMATING

Add to Reading List

Source URL: www.li.mahidol.ac.th

Language: English - Date: 2006-11-15 03:11:14
137Data security / Anomaly detection / Robust statistics / Intrusion detection system / Outlier / Computer virus / Anomaly-based intrusion detection system / Data Analysis Techniques for Fraud Detection / Statistics / Data mining / Data analysis

Special Issue on Security for Network Society Falsification Prevention and Protection Technologies and Products Data Mining for Security By Kenji YAMANISHI,* Jun-ichi TAKEUCHI* and Yuko MARUYAMA*

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:06
138Neural networks / Erol Gelenbe / Random neural network / Data security / Mobile telecommunications / Intrusion detection system / Malware / Network security / SMS / Technology / Mobile technology / Electronics

Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach Omer H. Abdelrahman, Erol Gelenbe, G¨okc¸e G¨orbil and Boris Oklander Abstract Mobile malware and mobile network attacks are becoming a significant

Add to Reading List

Source URL: san.ee.ic.ac.uk

Language: English - Date: 2013-07-02 14:44:03
139Data mining / Database theory / Database management systems / Relational database management systems / Cross-site scripting / SQL injection / Anomaly detection / Cluster analysis / Null / Data management / Statistics / Computing

Masibty: an anomaly based intrusion prevention system for web applications Claudio Criscione Secure Network Srl [removed] Stefano Zanero

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
140Security / Intrusion detection system / OWASP / Application security / Vulnerability / Snort / Evasion / Attack / Computer security / Cyberwarfare / Computer network security

OWASP AppSensor In Theory, In Practice and In Print AppSec Research 2013, Hamburg, Germany, 23rd August 2013 Colin Watson, Watson Hall Ltd Dennis Groves, Desago Ltd

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-09-02 16:50:03
UPDATE