Browsing by Subject "Intrusion detection systems (Computer security)"
Now showing items 1-6 of 6
-
Hardware/software mechanisms for protecting an IDS against algorithmic complexity attacks
(Institute of Electrical and Electronics Engineers (IEEE), 2012)
Conference report
Restricted access - publisher's policyIntrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems in the network. An IDS like the popular Snort[17] detects attacks on the network using a database of previous attacks. So ... -
IDS: Sistemas de Detección de Intrusión
(2010-12)
Audiovisual
Open Access -
Improving the resilience of an IDS against performance throttling attacks
(Springer, 2012)
Conference report
Restricted access - publisher's policyIntrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems in the network. To be effective against evasion attempts, the IDS must provide tight bounds on performance. Otherwise an ... -
Sistemas de detección de intrusión
(Factoria BCBL, 2011-05-02)
Audiovisual
Open Access -
Sistemes de detecció de cucs: comparativa
(Universitat Politècnica de Catalunya, 2008-05-26)
Master thesis (pre-Bologna period)
Restricted access - author's decisionL’expansió d’Internet ha donat origen a nombroses amenaces virtuals. Una de les més perilloses i al mateix temps difícils de detectar, afavorits per la poca diversitat de plataformes, són els cucs, el quals poden causar ... -
Towards a unified approach to detection of faults and cyber-attacks in industrial installations
(Institute of Electrical and Electronics Engineers (IEEE), 2021)
Conference report
Open AccessThis paper investigates enhancing the ability to detect cyber-attacks by using information and methods related to fault detection. An experimental stand, and an associated simulator have been constructed to enable tests ...