Search results

Jump to: navigation, search
  • ;Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) ;International Symposium on Recent Advances in Intrusion Detection
    5 KB (675 words) - 01:53, 8 July 2018
  • ...60]], [[Tiger]], [[WHIRLPOOL]], [[SHA-256]] or [[SHA-512]]. Host Intrusion Detection systems and hash databases should also use multiple hash algorithms.
    1 KB (167 words) - 23:28, 19 December 2007
  • '''OSSEC HIDS''' is an open source host-based intrusion detection system.
    139 B (18 words) - 19:38, 18 April 2006
  • ...ection used by many modern applications such as online games and intrusion detection systems. Kernel-mode operation yields more reliable results compared to use
    11 KB (1,630 words) - 15:50, 20 April 2018
  • ''The DARPA Intrusion Detection Evaluation.'' In 1998, 1999 and 2000 the Information Systems Technology Gro ....ll.mit.edu/IST/ideval/data/1998/1998_data_index.html 1998 DARPA Intrusion Detection Evaluation]
    9 KB (1,335 words) - 18:24, 6 February 2014
  • : Instrusion Detection System, includes session reconstruction. ...complements existing network security tools, such as firewalls, intrusion detection/prevention systems and switches/routers, to help provide comprehensive defe
    12 KB (1,779 words) - 09:41, 4 January 2016
  • title="Distinct Sector hashing for Target Detection", ...most popular one is due to Jesse Kornblum, who transferred ideas from spam detection to computer forensics in order to identify similar files. However, his prop
    49 KB (7,290 words) - 18:56, 30 October 2017
  • ...is an 802.11 layer2 wireless network detector, [[sniffer]], and intrusion detection system. * Network IP range detection;
    2 KB (183 words) - 19:19, 24 September 2008
  • * Detect intrusion attempts; == Detection of network sniffers ==
    2 KB (312 words) - 22:14, 23 May 2009
  • == Detection of hidden channels == ...o detect hidden channels by detecting attendant events, such as successful intrusion attempts. Some hidden channels produce network anomalies, for example, hidd
    1 KB (202 words) - 01:39, 27 January 2018
  • * Provides detection of password protected archives, some files of cryptographic programs, Pinch * M. McDaniel, [[Media:Mcdaniel01.pdf|Automatic File Type Detection Algorithm]], Masters Thesis, James Madison University,2001
    9 KB (1,269 words) - 10:40, 3 May 2018
  • ...high-volume IP-based network log data. Log data from firewalls, intrusion detection systems, routers and other network devices is streamed to Net/FSE in near r
    2 KB (256 words) - 09:50, 18 January 2014
  • ...malicious code in memory. It is designed for two use cases: 1. intrusion detection (early warning system for Linux compromise), and 2. incident response (memo
    6 KB (799 words) - 14:29, 28 March 2017
  • ...t authorities. Mr. Padres also directed network surveillance and intrusion detection counterintelligence operations for U.S. government agencies, for which he b
    3 KB (467 words) - 00:43, 21 August 2011
  • ...ence in computer forensics, vulnerability and exploit discovery, intrusion detection/prevention, and incident response.
    2 KB (294 words) - 00:39, 21 August 2011
  • SnortĀ® is an open source network intrusion prevention and detection system (IDS/IPS) developed by [http://www.sourcefire.com/ Sourcefire]. ...nloads and nearly 400,000 registered users, it is the most widely deployed intrusion prevention technology in the world.
    4 KB (585 words) - 23:05, 1 November 2016