Academic view of Intrusion Detection, Intrusion Prevention and Security Information Management. Focus on technologies, methods, and data analysis related to IDS/IPS and SIM.
More information
More information
Related categories 1
Sites 10
Hummer is a distributed component for any Intrusion Detection System ; Magpie is a hierarchical network of lightweight, mobile, and adaptive tools designed to both investigate and guard against intrusions.
Perdue University's clearinghouse for intrusion detection information. Includes overviews, policy, detection methods, and tools.
Aims to develop protocols and application programming interfaces so that intrusion detection research projects can share information and resources and so that intrusion detection components can be reused in other systems.
A Data Mining Approach for Building Cost-sensitive and Light Intrusion Detection Models
A case study/research paper providing detailed analysis of several anomalous network events to illustrate the techniques for examining alerts and logs generated by a network intrusion detection system.
This project is a data-mining based approach to detecting intruders in computer systems. The project approaches the intrusion detection problem from a data-mining perspective. Large quantities of data are collected from the system and analyzed to build models of normal behavior and intrusion behavior. These models are evaluated on data collected in real time to detect intruders.
Anomaly Detection in Database Systems, Common Intrusion Detection Framework, Intrusion Detection and Isolation Protocol / IDIP, Intrusion Detection for Large Networks, Misuse Detection and Workshop for Intrusion Detection and Response Data Sharing.
A group mailing focusing on security information management, intrusion response, intrusion detection, intrusion prevention, intrusion management and honeynets/honeypots.
International Symposium on Recent Advances in Intrusion Detection. Held in conjunction with ESORICS 2004, September 15-17, 2004. The RAID International Symposium series is intended to advance the field of intrusion detection by promoting the exchange of ideas on a broad range of topics, bringing together leading experts from academia, government, and industry to discuss state-of-the-art intrusion detection technologies and issues from research and commercial perspectives.
Research project that utilizes network attack variations to make more precise statements about the detection capabilities of an IDS.
Hummer is a distributed component for any Intrusion Detection System ; Magpie is a hierarchical network of lightweight, mobile, and adaptive tools designed to both investigate and guard against intrusions.
Perdue University's clearinghouse for intrusion detection information. Includes overviews, policy, detection methods, and tools.
A case study/research paper providing detailed analysis of several anomalous network events to illustrate the techniques for examining alerts and logs generated by a network intrusion detection system.
Aims to develop protocols and application programming interfaces so that intrusion detection research projects can share information and resources and so that intrusion detection components can be reused in other systems.
Research project that utilizes network attack variations to make more precise statements about the detection capabilities of an IDS.
A Data Mining Approach for Building Cost-sensitive and Light Intrusion Detection Models
International Symposium on Recent Advances in Intrusion Detection. Held in conjunction with ESORICS 2004, September 15-17, 2004. The RAID International Symposium series is intended to advance the field of intrusion detection by promoting the exchange of ideas on a broad range of topics, bringing together leading experts from academia, government, and industry to discuss state-of-the-art intrusion detection technologies and issues from research and commercial perspectives.
Anomaly Detection in Database Systems, Common Intrusion Detection Framework, Intrusion Detection and Isolation Protocol / IDIP, Intrusion Detection for Large Networks, Misuse Detection and Workshop for Intrusion Detection and Response Data Sharing.
This project is a data-mining based approach to detecting intruders in computer systems. The project approaches the intrusion detection problem from a data-mining perspective. Large quantities of data are collected from the system and analyzed to build models of normal behavior and intrusion behavior. These models are evaluated on data collected in real time to detect intruders.
A group mailing focusing on security information management, intrusion response, intrusion detection, intrusion prevention, intrusion management and honeynets/honeypots.
Last update:
June 24, 2023 at 6:45:05 UTC
Check out
Recreation: Food: Drink: Beer: Brewers: Belgium
- Recently edited by merlin1
- Recently edited by merlin1