Results 381-400 of 401.
![]() Ostaszewski, Marek ![]() ![]() in The 21th IEEE International Parallel and Distributed Processing Symposium (IPDPS), NIDISC Workshop. (2008) In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variable properties, like ... [more ▼] In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDS), that aims at dealing with large scale network attacks featuring variable properties, like Denial of Service (DoS). The proposed architecture performs dynamic and adaptive clustering of the network traffic for taking fast and effective countermeasures against such high-volume attacks. INIDS is evaluated on the MIT'99 dataset and outperforms previous approaches for DoS detection applied to this set. [less ▲] Detailed reference viewed: 152 (0 UL)![]() ![]() Varrette, Sébastien ![]() ![]() ![]() in International Conference on Metaheuristics and Nature Inspired Computing (META'08) (2008) Detailed reference viewed: 95 (0 UL)![]() ![]() Dunlop, Dominic ![]() ![]() ![]() in IEEE International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS'08) (2008) Detailed reference viewed: 127 (0 UL)![]() ![]() Hogie, Luc ![]() ![]() ![]() in Second International Conference on Modelling, Computation and Optimization in Information Systems and Management Sciences (MCO 2008) (2008) Detailed reference viewed: 124 (5 UL)![]() ![]() Dorronsoro, Bernabé ![]() ![]() ![]() in special session on Parallel and Grid Computing for Optimization as part of The 2008 International Conference High Performance Computing & Simulation (HPCS008) and in conjunction with The 22nd European Conference on Modeling and Simulation (ECMS 2008). (2008) Detailed reference viewed: 92 (5 UL)![]() Ruiz, Patricia ![]() ![]() in special session on Parallel and Grid Computing for Optimization as part of The 2008 International Conference High Performance Computing & Simulation (HPCS'08) and in conjunction with The 22nd European Conference on Modeling and Simulation (ECMS 2008) (2008) Detailed reference viewed: 308 (7 UL)![]() Ostaszewski, Marek ![]() ![]() in Journal of Mathematical Modelling and Algorithms (2007), 6(3), 411-431 The paper presents an approach based on the principles of immune systems applied to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by building a ... [more ▼] The paper presents an approach based on the principles of immune systems applied to the anomaly detection problem. Flexibility and efficiency of the anomaly detection system are achieved by building a model of the network behavior based on the self-nonself space paradigm. Covering both self and nonself spaces by hyperrectangular structures is proposed. The structures corresponding to self-space are built using a training set from this space. The hyperrectangular detectors covering nonself space are created using a niching genetic algorithm. A coevolutionary algorithm is proposed to enhance this process. The results of experiments show a high quality of intrusion detection, which outperform the quality of the recently proposed approach based on a hypersphere representation of the self-space. [less ▲] Detailed reference viewed: 155 (2 UL)![]() ![]() Danoy, Grégoire ![]() ![]() ![]() in Congress on Evolutionary Computation (CEC) (2007) Detailed reference viewed: 125 (6 UL)![]() ![]() Danoy, Grégoire ![]() ![]() in The 21st European Conference on Modeling and Simulation (ECMS 2007) (2007) Detailed reference viewed: 68 (9 UL)![]() ![]() Danoy, Grégoire ![]() ![]() ![]() in 9th annual conference on Genetic and evolutionary computation (GECCO '07) (2007) Detailed reference viewed: 125 (3 UL)![]() ![]() Bouvry, Pascal ![]() in Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (2006) Detailed reference viewed: 101 (0 UL)![]() ![]() Danoy, Grégoire ![]() ![]() in ANNIE 2006: Proceedings of the 16th international conference on Artificial Neural Networks In Engineering (2006) Detailed reference viewed: 97 (6 UL)![]() ![]() Danoy, Grégoire ![]() ![]() in HIS'06: Proceedings of the 6th international conference on Hybrid Intelligent Systems (2006) Detailed reference viewed: 139 (5 UL)![]() Bernard, Nicolas ![]() ![]() in Leprévost, Franck; Ebrahimi, Touradj; Warusfel, Bertrand (Eds.) Cryptographie et sécurité de systèmes et réseaux (2006) Detailed reference viewed: 123 (5 UL)![]() ![]() Hogie, Luc ![]() ![]() in 9th ACM/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWIM'06) (2006) Detailed reference viewed: 105 (3 UL)![]() ![]() Bouvry, Pascal ![]() in Sécurité Multimédia: Cryptographie et Sécurité Systèmes et Réseaux (2006) Detailed reference viewed: 100 (1 UL)![]() ![]() Danoy, Grégoire ![]() ![]() in 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2005) (2005) Detailed reference viewed: 169 (7 UL)![]() Danoy, Grégoire ![]() ![]() in Proceedings of the ROADEF (2005) Detailed reference viewed: 114 (5 UL)![]() ![]() Danoy, Grégoire ![]() ![]() in Proceedings of the International Conference on Information and Knowledge Engineering (2004) Detailed reference viewed: 103 (3 UL)![]() ![]() Danoy, Grégoire ![]() ![]() in AISTA 2004 (International Conference on Advances in Intelligent Systems - Theory and Applications) organized in cooperation with the IEEE Computer Society (2004) Detailed reference viewed: 122 (6 UL) |
||