Now showing items 1-4 of 4

    • Architecture support for intrusion detection systems 

      Sreekar Shenoy, Govind (Universitat Politècnica de Catalunya, 2012-10-30)
      Doctoral thesis
      Open Access
      System security is a prerequisite for efficient day-to-day transactions. As a consequence, Intrusion Detection Systems (IDS) are commonly used to provide an effective security ring to systems in a network. An IDS operates ...
    • Hardware/software mechanisms for protecting an IDS against algorithmic complexity attacks 

      Sreekar Shenoy, Govind; Tubella Murgadas, Jordi; González Colás, Antonio María (Institute of Electrical and Electronics Engineers (IEEE), 2012)
      Conference report
      Restricted access - publisher's policy
      Intrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems in the network. An IDS like the popular Snort[17] detects attacks on the network using a database of previous attacks. So ...
    • Improving the performance efficiency of an IDS by exploiting temporal locality in network traffic 

      Sreekar Shenoy, Govind; Tubella Murgadas, Jordi; González Colás, Antonio María (2012)
      Conference report
      Restricted access - publisher's policy
      Network traffic has traditionally exhibited temporal locality in the header field of packets. Such locality is intuitive and is a consequence of the semantics of network protocols. However, in contrast, the locality in the ...
    • Improving the resilience of an IDS against performance throttling attacks 

      Sreekar Shenoy, Govind; Tubella Murgadas, Jordi; González Colás, Antonio María (Springer, 2012)
      Conference report
      Restricted access - publisher's policy
      Intrusion Detection Systems (IDS) have emerged as one of the most promising ways to secure systems in the network. To be effective against evasion attempts, the IDS must provide tight bounds on performance. Otherwise an ...