what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 108 RSS Feed

Files

IDS For Grid And Cloud Computing
Posted Apr 6, 2011
Authored by L0rd CrusAd3r

Whitepaper called IDS For Grid and Cloud Computing - An Explanation On Inner Workings and Construction.

tags | paper
SHA-256 | 354c2e231ed017ede385cce2677f5f85c42d60193ffade2d867a26e4e3caf1b6
SNORT - First Line Of Defense For Web Application Attacks
Posted Jan 22, 2009
Authored by SECInfy Team

SNORT is the most widely used open source IDS to date. SNORT has introduced inline mode which can be used to drop packets. Using inline mode, SNORT can be used as firewall as well. This paper outlines how to write common SNORT rules to protect against common web application attacks.

tags | paper, web
SHA-256 | d603d7cd574e3847201f6539864090cf47b67e46dbdcd2a8dafbe7a0b3cb0807
A-comparative-study-of-anomaly-detection-schemes-in-network-intrusion-detection.pdf
Posted Nov 1, 2006

A comparative study of anomaly detection schemes in network intrusion detection.

tags | paper
SHA-256 | b9928e0c57d7fdc9212d412d47a979bfa6ae04da6fed4884e9c6313b71e3f0c1
A-Data-Mining-Framework-for-Building-IDS.pdf
Posted Nov 1, 2006

A Data Mining Framework for Building Intrusion Detection Models.

tags | paper
SHA-256 | 60d04b31fcfe448027bbb5860b8344475e331292a2f38a9c58a5f6bf8565794d
A-Framework-For-An-Adaptive-Intrusion-Detection-System.pdf
Posted Nov 1, 2006

A Framework For An Adaptive Intrusion Detection System with Data Mining.

tags | paper
SHA-256 | 8f6eb99f5161f3bdc97f1b2abc1790661385fcd2a732370cb3a64ad0d76ff3b4
A-Framework-for-Classifying-DoS-Attacks.pdf
Posted Nov 1, 2006

A Framework for Classifying Denial of Service Attacks.

tags | paper, denial of service
SHA-256 | 6bb2ae1d0f82b729c5207119d92f40b2d239e203a10af9bec1f54258ede9691e
A-Framework-for-Constructing-Features-and-Models-for-IDS.pdf
Posted Nov 1, 2006

A Framework for Constructing Features and Models for Intrusion Detection Systems.

tags | paper
SHA-256 | f61527cf4af2510db8ad35437d3eb26e96999237907e12a510de0e49b2733a31
A-Geometric-Frameowkr-for-Unsupervised-Anomaly-Detection.pdf
Posted Nov 1, 2006

A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data.

tags | paper
SHA-256 | 0449a5f802f6d128eb3b915c406f89489a0cd361eccb64aa70000c137ec98639
A-Learning-Based-Approach-to-the-Detection-of-SQL-Attacks.pdf
Posted Nov 1, 2006

A Learning Based Approach to the Detection of SQL Attacks.

tags | paper
SHA-256 | fb14d0903dcb142210d09d168d0e7272d143fb9ec59f4aea8414793dabf2f3d3
A-Multi-model-Approach-to-the-Detection-of-Web-based-Attacks.pdf
Posted Nov 1, 2006

A Multimodel Approach to the Detection of Web-based Attacks.

tags | paper, web
SHA-256 | 9117f01a49f372f1077722bd13c30ab099dadef91785ce47ff698440299999b1
ADAM-Detecting-Intrusions-by-Data-Mining.pdf
Posted Nov 1, 2006

ADAM: Detecting Intrusions by Data Mining.

tags | paper
SHA-256 | 365871b2726492c541c1128a5b7aa28e3b8f49a1efca1a45ea31c32a99328740
Adaptive-Model-Based-Monitoring-and-Threat-Detection.pdf
Posted Nov 1, 2006

Adaptive ModelBased Monitoring and Threat Detection.

tags | paper
SHA-256 | ffb2ace3c126a841b0995e6762b65668e80fa180369921ba297bf8a07215995c
Advanced-Polymorphic-Worms.pdf
Posted Nov 1, 2006

Advanced Polymorphic Worms: Evading IDS by Blending with Normal Traffic.

tags | paper, worm
SHA-256 | 172077357cd30fcc62e04169f1ec84f6a94d98bf29814df319b1c50ade80699a
An-Analysis-of-1999-DARPA-for-Network-Anomaly-Detection.pdf
Posted Nov 1, 2006

An Analysis of 1999 DARPA for Network Anomaly Detection.

tags | paper
SHA-256 | d4666f6ffd4ce7a95bacc505648efa236a6525bb48d04ed5b62be09a89deaf2b
Anagram.pdf
Posted Nov 1, 2006

Anagram: A Content Anomaly Detector Resistant to Mimicry Attack.

tags | paper
SHA-256 | b8315ea07cf451e421585c010d3d279254f025a76e8535e1570373c64d43931c
ANN-for-Misuse-Detection.pdf
Posted Nov 1, 2006

Artificial Neural Networks for Misuse Detection.

tags | paper
SHA-256 | 453df9e792073f3916624b46fe6e9046520fa730ae9f4f767c0dd6fc2b1dbba3
Anomalous-Payload-based-NIDS.pdf
Posted Nov 1, 2006

Anomalous Payloadbased Network Intrusion Detection.

tags | paper
SHA-256 | 9c25b1fec06554bffaf334517971c4cb2970439182656787fe2c7be234ba7537
Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf
Posted Nov 1, 2006

Anomalous Payloadbased Worm Detection and Signature Generation.

tags | paper, worm
SHA-256 | 1a316e80a29f60a55607e500d38fbace3e0c8aa7b2006af81a622cbbe5f4d5c0
Anomaly-Detection-of-Web-based-Attacks.pdf
Posted Nov 1, 2006

Anomaly Detection of Webbased Attacks.

tags | paper
SHA-256 | c369809658f5a0f07f13ac5ff735d08a77fc9ec3cf8423f28b77e5130f59be51
Application-of-ANN-to-Misuse-Detection.pdf
Posted Nov 1, 2006

Application of Artiticial Neural Network to Misuse Detection: Initial Results.

tags | paper
SHA-256 | ad265ece6bdbe90f06722c37a8c536e35747fae08fb3245b7017a1639611694e
Audit-Data-Reduction-for-Intrusion-Detection.pdf
Posted Nov 1, 2006

Audit Data Reduction for Intrusion Detection.

tags | paper
SHA-256 | b35c688d5912ca6b3d789328c4e4a6e187a7d8c3ef95b11e1529030e8287538d
Autograph.pdf
Posted Nov 1, 2006

Autograph: Toward Automated, Distributed Worm Signature Detection.

tags | paper, worm
SHA-256 | 0cb4a3046f7bf52bd0b79c0cbfe693b088d13cc12fc0289d06e30e18c8114e8c
Bayesian-Event-Classification-for-ID.pdf
Posted Nov 1, 2006

Bayesian Event Classification for Intrusion Detection.

tags | paper
SHA-256 | ad80f2bb538c68b96ee709af75a70a2fae32e56977d7f19e998361089e52922d
Bro-A-System-for-Detecting-Network-Intruders-in-RT.pdf
Posted Nov 1, 2006

Bro: A System for Detecting Network Intruders in RealTime.

tags | paper
SHA-256 | a6a812761c18136a77155455be3a7647d70dec890681e1d874f2143672587d31
Characteristics-of-Network-Flow-Anomalies.pdf
Posted Nov 1, 2006

Characteristics of Network Flow Anomalies.

tags | paper
SHA-256 | 2af73f0d81a7be88804e65be8fc333406c2fbbd53f394f35f29fe3432578771f
Page 1 of 5
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close