Now showing items 1-6 of 6

    • Hardware/software mechanisms for protecting an IDS against algorithmic complexity attacks 

      Sreekar Shenoy, Govind; Tubella Murgadas, Jordi; González Colás, Antonio María (Institute of Electrical and Electronics Engineers (IEEE), 2012)
      Conference report
      Restricted access - publisher's policy
      Intrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems in the network. An IDS like the popular Snort[17] detects attacks on the network using a database of previous attacks. So ...
    • IDS: Sistemas de Detección de Intrusión 

      López Nuevo, David Andrés (2010-12)
      Audiovisual
      Open Access
    • Improving the resilience of an IDS against performance throttling attacks 

      Sreekar Shenoy, Govind; Tubella Murgadas, Jordi; González Colás, Antonio María (Springer, 2012)
      Conference report
      Restricted access - publisher's policy
      Intrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems in the network. To be effective against evasion attempts, the IDS must provide tight bounds on performance. Otherwise an ...
    • Sistemas de detección de intrusión 

      Gallego Ezpeleta, Javier (Factoria BCBL, 2011-05-02)
      Audiovisual
      Open Access
    • Sistemes de detecció de cucs: comparativa 

      Puig Sanz, Joan (Universitat Politècnica de Catalunya, 2008-05-26)
      Master thesis (pre-Bologna period)
      Restricted access - author's decision
      L’expansió d’Internet ha donat origen a nombroses amenaces virtuals. Una de les més perilloses i al mateix temps difícils de detectar, afavorits per la poca diversitat de plataformes, són els cucs, el quals poden causar ...
    • Towards a unified approach to detection of faults and cyber-attacks in industrial installations 

      Koscielny, Jan; Syfert, Michal; Ordys, Andrzej; Wnuk, Pawel; Mozaryn, Jakub; Fajdek, Bartlomiej; Puig Cayuela, Vicenç; Kukielka, Krzysztof (Institute of Electrical and Electronics Engineers (IEEE), 2021)
      Conference report
      Open Access
      This paper investigates enhancing the ability to detect cyber-attacks by using information and methods related to fault detection. An experimental stand, and an associated simulator have been constructed to enable tests ...