GLIB 发表于 2025-3-27 00:01:38

Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrixes such as UNIX commands and extracts their principal features. We applied the ECM method to a masquerade detection experiment with data from Schonlau et al. We report the results and compare them with results obtained from several conventional methods.

低位的人或事 发表于 2025-3-27 04:45:32

Seurat: A Pointillist Approach to Anomaly Detectionoped a method to detect similar, coincident changes to the patterns of file updates that are shared across multiple hosts. We have implemented this approach in a prototype system called . and demonstrated its effectiveness using a combination of real workstation cluster traces, simulated attacks, and a manually launched Linux worm.

lavish 发表于 2025-3-27 08:40:17

http://reply.papertrans.cn/83/8229/822814/822814_33.png

极微小 发表于 2025-3-27 09:43:45

Conference proceedings 2004n (RAID 2004), which took place in Sophia-Antipolis, French Riviera, France, September 15–17, 2004. The symposium brought together leading researchers and practitioners from academia, government and industry to discuss intrusion detection from research as well as commercial perspectives. We also enc

Tailor 发表于 2025-3-27 16:35:35

Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossibltrol flow and restrict system call permissions to conform to the legitimate needs of application functions. We describe our design and implementation of waypoints and present results showing that waypoint-based anomaly monitors can detect a subset of mimicry attacks and impossible paths.

纪念 发表于 2025-3-27 17:49:52

Monitoring IDS Background Noise Using EWMA Control Charts and Alert Informationhing. The aim is to make output of verbose signatures more tolerable for the operator and yet allow him to obtain the useful information available. The applied method is described and experimentation along its results with real world data are presented. A test metric is proposed to evaluate the results.

起草 发表于 2025-3-27 23:42:33

http://reply.papertrans.cn/83/8229/822814/822814_37.png

Suppository 发表于 2025-3-28 04:41:32

http://reply.papertrans.cn/83/8229/822814/822814_38.png

armistice 发表于 2025-3-28 10:08:29

978-3-540-23123-3Springer-Verlag Berlin Heidelberg 2004

linear 发表于 2025-3-28 11:20:25

http://reply.papertrans.cn/83/8229/822814/822814_40.png
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Recent Advances in Intrusion Detection; 7th International Sy Erland Jonsson,Alfonso Valdes,Magnus Almgren Conference proceedings 2004 Sprin