A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2007; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cooperative Forensics Sharing
2006
2006 1st Bio-Inspired Models of Network, Information and Computing Systems
Foresight utilizes this infrastructure to share a global threat view in order to detect unknown threats and isolate them. ...
In this paper, we present Foresight, an internet scale threat analysis, indication, early warning and response architecture. ...
Viruses and worms are able to spread with great speed and are capable of harnessing the size and scale of the internet to launch high-powered distributed attacks. ...
doi:10.1109/bimnics.2006.361814
fatcat:6cwxqlib55g27ne46a6tq6mj2a
Cooperative forensics sharing
2006
Proceedings of the 1st international conference on Bio inspired models of network, information and computing systems - BIONETICS '06
Foresight utilizes this infrastructure to share a global threat view in order to detect unknown threats and isolate them. ...
In this paper, we present Foresight, an internet scale threat analysis, indication, early warning and response architecture. ...
Viruses and worms are able to spread with great speed and are capable of harnessing the size and scale of the internet to launch high-powered distributed attacks. ...
doi:10.1145/1315843.1315875
dblp:conf/bionetics/ZaffarK06
fatcat:gqgljqdpkzbpdfnkmambbni4uy
Distributed reinforcement learning for adaptive and robust network intrusion response
2015
Connection science
One of the most serious threats in the current Internet is posed by distributed denial of service (DDoS) attacks, which target the availability of the victim system. ...
Such an attack is designed to exhaust a server's resources or congest a network's infrastructure, and therefore ...
ratio of false to real alarms will be 100". ...
doi:10.1080/09540091.2015.1031082
fatcat:vzwfb5cclzdqdhwgxzqozxe3xi
Of Threats and Costs: A Game-Theoretic Approach to Security Risk Management
[chapter]
2010
Performance Models and Risk Management in Communications Systems
Part of this work has been supported by the Austrian government and the city of Vienna in the framework of the COMET competence centre program and by the French research agency through the FLUOR project ...
Detection is performed through a CUSUM (cumulative sum) test, minimizing the time between infection and detection for a given false-positive rate. ...
at the same speed. ...
doi:10.1007/978-1-4419-0534-5_2
fatcat:s37ykxheprb2vecjz53usg6zoe
The Evolution of System-Call Monitoring
2008
2008 Annual Computer Security Applications Conference (ACSAC)
the term computer virus was coined. ...
The paper discusses the biological principles illustrated by the method, followed by a brief review of how system call monitoring was used in anomaly intrusion detection and the results that were obtained ...
In particular, we thank Dave Ackley, Tom Longstaff, and Eugene Spafford. Jed Crandall, Dave Evans, ThanhVu Nguyen, and Eugene Spafford made many helpful suggestions on this manuscript. ...
doi:10.1109/acsac.2008.54
dblp:conf/acsac/ForrestAHS08
fatcat:bpfega77lvhnrgx235mj2iutla
Computer immunology
2007
Immunological Reviews
These artificial immune systems (AIS) simulate the behavior of the natural immune system and in some cases have been used to solve practical engineering problems such as computer security. ...
Keywords: artificial immune system, agent-based models, in silico modeling, computational immunology ...
F. to the complexities of immunology and contributed many of the important insights describe in this paper. S. ...
doi:10.1111/j.1600-065x.2007.00499.x
pmid:17367343
fatcat:y6pwsmm22baiphslwt6lrlz7se
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
21st Annual Computer Security Applications Conference (ACSAC'05)
We have successfully used BINDER to detect real world spyware on daily used computers and email worms on a controlled testbed with very small false positives. ...
In this paper, we tackle the problem of automated detection of break-ins caused by unknown malware targeting personal computers. ...
This enables BINDER to detect a large class of malware and achieve minimal false alarms. ...
doi:10.1109/csac.2005.19
dblp:conf/acsac/CuiKT05
fatcat:x5gjrcnsg5cj3ax46onmd7ql4m
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks
2013
IEEE Communications Surveys and Tutorials
However, the development of such a mechanism requires a comprehensive understanding of the problem and the techniques that have been used thus far in preventing, detecting, and responding to various DDoS ...
In this paper, we explore the scope of the DDoS flooding attack problem and attempts to combat it. ...
This research has been supported by Cisco systems' research award and the NSF award CCF-0720737. ...
doi:10.1109/surv.2013.031413.00127
fatcat:tjnielpldfdazdnxtvxvy4so2e
Foresight: Countering malware through cooperative forensics sharing Foresight: Countering malware through cooperative forensics sharing
unpublished
Modern viruses and worms are causing damage much more quickly than those created in the past. ...
Worms and viruses have been able to cause significant damage in this 'submission to cure generation" window of vulnerability. ...
Acknowledgements This effort is dedicated to my wonderful parents Afzal and khalida , my lovely wife Mahira and my siblings, Nausheen, Naveed and Adeel. ...
fatcat:2ufldmh3xfbetioiynleuytoui
Multi-agent Reinforcement Learning for Intrusion Detection
[chapter]
Adaptive Agents and Multi-Agent Systems III. Adaptation and Multi-Agent Learning
In the network environment we evaluated the performance of our proposal versus hand-coded solutions emulating i simple misuse intrusion detection and a hybrid approach using misuse and anomaly methods. ...
This thesis presents a novel approach to provide adaptive mechanisms to detect and categorise Flooding-Base DoS (FBDoS) and Flooding-Base DDoS (FBDDoS) attacks. ...
ROC curves show the intrusion detection rate as a function of the false-alarm rate, points are plotted using the number of false alarms in the x-axis and the intrusion detection rate in the y-axis. ...
doi:10.1007/978-3-540-77949-0_15
dblp:conf/aamas/ServinK07
fatcat:ut2e6gro5vdltdjbnji4sm3ulu
The Function of Artificial Intelligence in Improving Criminal Justice System with Reference to Indian
[chapter]
2022
Cyber Crime, Regulations and Security - Contemporary Issues and Challenges
in cyberspace. ...
Cyber space and its regulation are a fast-developing arena, having multidisciplinary disciplinary approach to tackle the innovation, technological developments and cybercrimes emerging from interactions ...
Thoughts and be-
Acknowledgements We thank the referees for Sharda University hospital and Wolaita Sodo University Teaching Referral hospital ...
doi:10.55662/book.2022ccrs.003
fatcat:j377lac4wzagtpw33gzyb3gcae
Detection and Evaluation of Clusters within Sequential Data
[article]
2022
arXiv
pre-print
In particular, our sequential data is derived from human DNA, written text, animal movement data and financial markets. ...
Clustering algorithms for Block Markov Chains possess theoretical optimality guarantees and can be deployed in sparse data regimes. ...
Acknowledgments The authors also acknowledge support by the European Union's Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement no. 945045, and by the NWO Gravitation ...
arXiv:2210.01679v1
fatcat:jgoimy2edbb35ih4cjwjkveexy
Threat vector analysis in autonomous driving
[article]
2022
It is obvious that viruses or worms that can affect linux OS can also work on infotainment systems, giving access to systems functions or even more dangerous, allowing attackers to go further into the ...
that can be predicted and prevented is hacking and virus threats. ...
Radar (Radio Detection And Ranging): is a detection system that uses radio waves to determine range, angle and velocity of objects. It does so by emitting and receiving radio frequency signals. ...
doi:10.26253/heal.uth.14540
fatcat:5a3jnpgco5eudhefhhrkteygk4
Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communications (IITM), Winter Semester 2014/2015
[article]
2015
Robert(2004): Worm epidemics in
high-speed networks. ...
Every day internet users are targeted by viruses, malwares, worms, phishing, etc. ...
doi:10.2313/net-2015-03-1
fatcat:kcevxs4p65dmzkqhb4676vdlba
Defense in Depth: Foundations for Secure and Resilient IT Enterprises
2018
The Defense-in-Depth Foundational Curriculum is designed for students, ranging from system administrators to CIOs, who have some technical understanding of information systems and want to delve into how ...
Therefore, this course can be a useful pursuit for system administrators and IT security personnel who would like to step up to the management level. ...
"Electronic Privacy In Employment." January 1998. http://library.findlaw.com/1998/Jan/1/126935.html. ...
doi:10.1184/r1/6572912.v1
fatcat:jeahvxv6obcebi2mj5qo5yugdm
« Previous
Showing results 1 — 15 out of 21 results