Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








21 Hits in 6.1 sec

Cooperative Forensics Sharing

Fareed Zaffar, Gershon Kedem
2006 2006 1st Bio-Inspired Models of Network, Information and Computing Systems  
Foresight utilizes this infrastructure to share a global threat view in order to detect unknown threats and isolate them.  ...  In this paper, we present Foresight, an internet scale threat analysis, indication, early warning and response architecture.  ...  Viruses and worms are able to spread with great speed and are capable of harnessing the size and scale of the internet to launch high-powered distributed attacks.  ... 
doi:10.1109/bimnics.2006.361814 fatcat:6cwxqlib55g27ne46a6tq6mj2a

Cooperative forensics sharing

Fareed Zaffar, Gershon Kedem
2006 Proceedings of the 1st international conference on Bio inspired models of network, information and computing systems - BIONETICS '06  
Foresight utilizes this infrastructure to share a global threat view in order to detect unknown threats and isolate them.  ...  In this paper, we present Foresight, an internet scale threat analysis, indication, early warning and response architecture.  ...  Viruses and worms are able to spread with great speed and are capable of harnessing the size and scale of the internet to launch high-powered distributed attacks.  ... 
doi:10.1145/1315843.1315875 dblp:conf/bionetics/ZaffarK06 fatcat:gqgljqdpkzbpdfnkmambbni4uy

Distributed reinforcement learning for adaptive and robust network intrusion response

Kleanthis Malialis, Sam Devlin, Daniel Kudenko
2015 Connection science  
One of the most serious threats in the current Internet is posed by distributed denial of service (DDoS) attacks, which target the availability of the victim system.  ...  Such an attack is designed to exhaust a server's resources or congest a network's infrastructure, and therefore  ...  ratio of false to real alarms will be 100".  ... 
doi:10.1080/09540091.2015.1031082 fatcat:vzwfb5cclzdqdhwgxzqozxe3xi

Of Threats and Costs: A Game-Theoretic Approach to Security Risk Management [chapter]

Patrick Maillé, Peter Reichl, Bruno Tuffin
2010 Performance Models and Risk Management in Communications Systems  
Part of this work has been supported by the Austrian government and the city of Vienna in the framework of the COMET competence centre program and by the French research agency through the FLUOR project  ...  Detection is performed through a CUSUM (cumulative sum) test, minimizing the time between infection and detection for a given false-positive rate.  ...  at the same speed.  ... 
doi:10.1007/978-1-4419-0534-5_2 fatcat:s37ykxheprb2vecjz53usg6zoe

The Evolution of System-Call Monitoring

Stephanie Forrest, Steven Hofmeyr, Anil Somayaji
2008 2008 Annual Computer Security Applications Conference (ACSAC)  
the term computer virus was coined.  ...  The paper discusses the biological principles illustrated by the method, followed by a brief review of how system call monitoring was used in anomaly intrusion detection and the results that were obtained  ...  In particular, we thank Dave Ackley, Tom Longstaff, and Eugene Spafford. Jed Crandall, Dave Evans, ThanhVu Nguyen, and Eugene Spafford made many helpful suggestions on this manuscript.  ... 
doi:10.1109/acsac.2008.54 dblp:conf/acsac/ForrestAHS08 fatcat:bpfega77lvhnrgx235mj2iutla

Computer immunology

Stephanie Forrest, Catherine Beauchemin
2007 Immunological Reviews  
These artificial immune systems (AIS) simulate the behavior of the natural immune system and in some cases have been used to solve practical engineering problems such as computer security.  ...  Keywords: artificial immune system, agent-based models, in silico modeling, computational immunology  ...  F. to the complexities of immunology and contributed many of the important insights describe in this paper. S.  ... 
doi:10.1111/j.1600-065x.2007.00499.x pmid:17367343 fatcat:y6pwsmm22baiphslwt6lrlz7se

Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers

Weidong Cui, R.H. Katz, Wai-tian Tan
21st Annual Computer Security Applications Conference (ACSAC'05)  
We have successfully used BINDER to detect real world spyware on daily used computers and email worms on a controlled testbed with very small false positives.  ...  In this paper, we tackle the problem of automated detection of break-ins caused by unknown malware targeting personal computers.  ...  This enables BINDER to detect a large class of malware and achieve minimal false alarms.  ... 
doi:10.1109/csac.2005.19 dblp:conf/acsac/CuiKT05 fatcat:x5gjrcnsg5cj3ax46onmd7ql4m

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

Saman Taghavi Zargar, James Joshi, David Tipper
2013 IEEE Communications Surveys and Tutorials  
However, the development of such a mechanism requires a comprehensive understanding of the problem and the techniques that have been used thus far in preventing, detecting, and responding to various DDoS  ...  In this paper, we explore the scope of the DDoS flooding attack problem and attempts to combat it.  ...  This research has been supported by Cisco systems' research award and the NSF award CCF-0720737.  ... 
doi:10.1109/surv.2013.031413.00127 fatcat:tjnielpldfdazdnxtvxvy4so2e

Foresight: Countering malware through cooperative forensics sharing Foresight: Countering malware through cooperative forensics sharing

Muhammad Zaffar, Gershon Kedem, Jeff Chase, Jun Yang, Miguel Lobo, Wilfred Amaldoss, Muhammad Zaffar, Gershon Kedem, Jeff Chase, Jun Yang, Miguel Lobo, Wilfred Amaldoss
unpublished
Modern viruses and worms are causing damage much more quickly than those created in the past.  ...  Worms and viruses have been able to cause significant damage in this 'submission to cure generation" window of vulnerability.  ...  Acknowledgements This effort is dedicated to my wonderful parents Afzal and khalida , my lovely wife Mahira and my siblings, Nausheen, Naveed and Adeel.  ... 
fatcat:2ufldmh3xfbetioiynleuytoui

Multi-agent Reinforcement Learning for Intrusion Detection [chapter]

Arturo Servin, Daniel Kudenko
Adaptive Agents and Multi-Agent Systems III. Adaptation and Multi-Agent Learning  
In the network environment we evaluated the performance of our proposal versus hand-coded solutions emulating i simple misuse intrusion detection and a hybrid approach using misuse and anomaly methods.  ...  This thesis presents a novel approach to provide adaptive mechanisms to detect and categorise Flooding-Base DoS (FBDoS) and Flooding-Base DDoS (FBDDoS) attacks.  ...  ROC curves show the intrusion detection rate as a function of the false-alarm rate, points are plotted using the number of false alarms in the x-axis and the intrusion detection rate in the y-axis.  ... 
doi:10.1007/978-3-540-77949-0_15 dblp:conf/aamas/ServinK07 fatcat:ut2e6gro5vdltdjbnji4sm3ulu

The Function of Artificial Intelligence in Improving Criminal Justice System with Reference to Indian [chapter]

Km. Richa, Dr. Sushma Singh
2022 Cyber Crime, Regulations and Security - Contemporary Issues and Challenges  
in cyberspace.  ...  Cyber space and its regulation are a fast-developing arena, having multidisciplinary disciplinary approach to tackle the innovation, technological developments and cybercrimes emerging from interactions  ...  Thoughts and be- Acknowledgements We thank the referees for Sharda University hospital and Wolaita Sodo University Teaching Referral hospital  ... 
doi:10.55662/book.2022ccrs.003 fatcat:j377lac4wzagtpw33gzyb3gcae

Detection and Evaluation of Clusters within Sequential Data [article]

Alexander Van Werde, Albert Senen-Cerda, Gianluca Kosmella, Jaron Sanders
2022 arXiv   pre-print
In particular, our sequential data is derived from human DNA, written text, animal movement data and financial markets.  ...  Clustering algorithms for Block Markov Chains possess theoretical optimality guarantees and can be deployed in sparse data regimes.  ...  Acknowledgments The authors also acknowledge support by the European Union's Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement no. 945045, and by the NWO Gravitation  ... 
arXiv:2210.01679v1 fatcat:jgoimy2edbb35ih4cjwjkveexy

Threat vector analysis in autonomous driving [article]

Σπυρίδων Καμινιάρης, University Of Thessaly, Γεώργιος Σταμούλης
2022
It is obvious that viruses or worms that can affect linux OS can also work on infotainment systems, giving access to systems functions or even more dangerous, allowing attackers to go further into the  ...  that can be predicted and prevented is hacking and virus threats.  ...  Radar (Radio Detection And Ranging): is a detection system that uses radio waves to determine range, angle and velocity of objects. It does so by emitting and receiving radio frequency signals.  ... 
doi:10.26253/heal.uth.14540 fatcat:5a3jnpgco5eudhefhhrkteygk4

Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communications (IITM), Winter Semester 2014/2015 [article]

Georg Carle, Daniel Raumer, Lukas Schwaighofer, Chair For Network Architectures
2015
Robert(2004): Worm epidemics in high-speed networks.  ...  Every day internet users are targeted by viruses, malwares, worms, phishing, etc.  ... 
doi:10.2313/net-2015-03-1 fatcat:kcevxs4p65dmzkqhb4676vdlba

Defense in Depth: Foundations for Secure and Resilient IT Enterprises

Christopher May, Joshua Hammerstein, Jeffrey Mattson, Kristopher Rush
2018
The Defense-in-Depth Foundational Curriculum is designed for students, ranging from system administrators to CIOs, who have some technical understanding of information systems and want to delve into how  ...  Therefore, this course can be a useful pursuit for system administrators and IT security personnel who would like to step up to the management level.  ...  "Electronic Privacy In Employment." January 1998. http://library.findlaw.com/1998/Jan/1/126935.html.  ... 
doi:10.1184/r1/6572912.v1 fatcat:jeahvxv6obcebi2mj5qo5yugdm
« Previous Showing results 1 — 15 out of 21 results