seeing is believing
Showing 1 - 25 of 108 RSS Feed

Files

IDS For Grid And Cloud Computing
Posted Apr 6, 2011
Authored by L0rd CrusAd3r

Whitepaper called IDS For Grid and Cloud Computing - An Explanation On Inner Workings and Construction.

tags | paper
MD5 | 9524e0c1091b101d3755823882e8f0e9
SNORT - First Line Of Defense For Web Application Attacks
Posted Jan 22, 2009
Authored by SECInfy Team

SNORT is the most widely used open source IDS to date. SNORT has introduced inline mode which can be used to drop packets. Using inline mode, SNORT can be used as firewall as well. This paper outlines how to write common SNORT rules to protect against common web application attacks.

tags | paper, web
MD5 | c48a28c64baf60495d19af860edcbdab
A-comparative-study-of-anomaly-detection-schemes-in-network-intrusion-detection.pdf
Posted Nov 1, 2006

A comparative study of anomaly detection schemes in network intrusion detection.

tags | paper
MD5 | dcf083a1d2e21e0da98dbad88d51d1b1
A-Data-Mining-Framework-for-Building-IDS.pdf
Posted Nov 1, 2006

A Data Mining Framework for Building Intrusion Detection Models.

tags | paper
MD5 | 64680a57e28817ba0bebc198f5b51060
A-Framework-For-An-Adaptive-Intrusion-Detection-System.pdf
Posted Nov 1, 2006

A Framework For An Adaptive Intrusion Detection System with Data Mining.

tags | paper
MD5 | db29d4147342fee62a836a48ed04e248
A-Framework-for-Classifying-DoS-Attacks.pdf
Posted Nov 1, 2006

A Framework for Classifying Denial of Service Attacks.

tags | paper, denial of service
MD5 | 44447f138d49336dcfb6f0acb5284296
A-Framework-for-Constructing-Features-and-Models-for-IDS.pdf
Posted Nov 1, 2006

A Framework for Constructing Features and Models for Intrusion Detection Systems.

tags | paper
MD5 | 6e640b55ae7f51cd3a66d5f8d01a458d
A-Geometric-Frameowkr-for-Unsupervised-Anomaly-Detection.pdf
Posted Nov 1, 2006

A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data.

tags | paper
MD5 | 9d8c2bd90e6edf496dfa72d8f0106fd9
A-Learning-Based-Approach-to-the-Detection-of-SQL-Attacks.pdf
Posted Nov 1, 2006

A Learning Based Approach to the Detection of SQL Attacks.

tags | paper
MD5 | 18c874195c5921eaf29ef5dd06e56b95
A-Multi-model-Approach-to-the-Detection-of-Web-based-Attacks.pdf
Posted Nov 1, 2006

A Multimodel Approach to the Detection of Web-based Attacks.

tags | paper, web
MD5 | c4b14c8548593136d524ac6dade6a254
ADAM-Detecting-Intrusions-by-Data-Mining.pdf
Posted Nov 1, 2006

ADAM: Detecting Intrusions by Data Mining.

tags | paper
MD5 | 48e61e3928f61a18e119516d365dbe13
Adaptive-Model-Based-Monitoring-and-Threat-Detection.pdf
Posted Nov 1, 2006

Adaptive ModelBased Monitoring and Threat Detection.

tags | paper
MD5 | 6960820d76e90acfb07123ded235dcd7
Advanced-Polymorphic-Worms.pdf
Posted Nov 1, 2006

Advanced Polymorphic Worms: Evading IDS by Blending with Normal Traffic.

tags | paper, worm
MD5 | 3590541dd2f42d7182e4d09494dcf016
An-Analysis-of-1999-DARPA-for-Network-Anomaly-Detection.pdf
Posted Nov 1, 2006

An Analysis of 1999 DARPA for Network Anomaly Detection.

tags | paper
MD5 | 2719ee36307dc45274b9e0f0a54ef2b6
Anagram.pdf
Posted Nov 1, 2006

Anagram: A Content Anomaly Detector Resistant to Mimicry Attack.

tags | paper
MD5 | 3a848bb307414f7bd29bb7c1729f2ffd
ANN-for-Misuse-Detection.pdf
Posted Nov 1, 2006

Artificial Neural Networks for Misuse Detection.

tags | paper
MD5 | fceeba6f1335d679ea92c0cc2b20d5dc
Anomalous-Payload-based-NIDS.pdf
Posted Nov 1, 2006

Anomalous Payloadbased Network Intrusion Detection.

tags | paper
MD5 | a2dc4b90cea63a81c3f26583149b086d
Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf
Posted Nov 1, 2006

Anomalous Payloadbased Worm Detection and Signature Generation.

tags | paper, worm
MD5 | fa3d6697c273b49489b40e166f7818c5
Anomaly-Detection-of-Web-based-Attacks.pdf
Posted Nov 1, 2006

Anomaly Detection of Webbased Attacks.

tags | paper
MD5 | 2fd4ae6f0249487b1b5dfede9e299adc
Application-of-ANN-to-Misuse-Detection.pdf
Posted Nov 1, 2006

Application of Artiticial Neural Network to Misuse Detection: Initial Results.

tags | paper
MD5 | 8d8b5efd562bf691cdb9ac644008ce83
Audit-Data-Reduction-for-Intrusion-Detection.pdf
Posted Nov 1, 2006

Audit Data Reduction for Intrusion Detection.

tags | paper
MD5 | 8c785feca2c5a1957619ddae33bc760f
Autograph.pdf
Posted Nov 1, 2006

Autograph: Toward Automated, Distributed Worm Signature Detection.

tags | paper, worm
MD5 | a55d83605ae8b4afde4c539036fa233c
Bayesian-Event-Classification-for-ID.pdf
Posted Nov 1, 2006

Bayesian Event Classification for Intrusion Detection.

tags | paper
MD5 | ce8ddaabab3ae1fa293dcd8b2feb65df
Bro-A-System-for-Detecting-Network-Intruders-in-RT.pdf
Posted Nov 1, 2006

Bro: A System for Detecting Network Intruders in RealTime.

tags | paper
MD5 | 763a71f31bba0e58c27cf2c818ff359e
Characteristics-of-Network-Flow-Anomalies.pdf
Posted Nov 1, 2006

Characteristics of Network Flow Anomalies.

tags | paper
MD5 | 4698086eb08b12f07f28cbd16516b847
Page 1 of 5
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Phishers Getting Smarter By Making Use Of User Location
Posted Oct 20, 2017

tags | headline, malware, cybercrime, fraud, phish
OSX Malware Spread Via Compromised Software Downloads
Posted Oct 20, 2017

tags | headline, malware, apple
Canadian Spooks Release Their Own Malware Detection Tool
Posted Oct 20, 2017

tags | headline, government, malware, canada, spyware
Judge: MalwareTech Is No Longer Under Curfew, GPS Monitoring
Posted Oct 20, 2017

tags | headline, hacker, government, malware, usa, conference
Microsoft Mocks Google For Failed Security Fix Deployment Methodology
Posted Oct 19, 2017

tags | headline, microsoft, flaw, google, chrome
Malicious Mineraft Apps In Google Play Enslave Your Device To A Botnet
Posted Oct 19, 2017

tags | headline, malware, microsoft, phone, botnet, google
OAIC Received 114 Voluntary Data Breach Notifications In Two Years
Posted Oct 19, 2017

tags | headline, hacker, privacy, australia, data loss
US-CERT Predicts Machine Learning To Become Security Risk
Posted Oct 19, 2017

tags | headline, flaw
ATM Malware Available Online For Online $5,000
Posted Oct 18, 2017

tags | headline, malware, bank, cybercrime, fraud
Oracle Swats 252 Bugs In Patch Update
Posted Oct 18, 2017

tags | headline, flaw, patch, oracle
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close