Zobrazeno 1 - 10
of 44
pro vyhledávání: '"Bolzoni, D."'
Publikováno v:
On the Move to Meaningful Internet Systems: OTM 2008 ISBN: 9783540888727
OTM Conferences (2)
Confederated International Conferences On the Move to Meaningful Internet Systems (OTM), 938-955
STARTPAGE=938;ENDPAGE=955;TITLE=Confederated International Conferences On the Move to Meaningful Internet Systems (OTM)
On the Move to Meaningful Internet Systems 2008: OTM 2008 Confederated International Conferences (Monterrey, Mexico, November 9-14, 2008), Part II, 938-955
STARTPAGE=938;ENDPAGE=955;TITLE=On the Move to Meaningful Internet Systems 2008: OTM 2008 Confederated International Conferences (Monterrey, Mexico, November 9-14, 2008), Part II
OTM Conferences (2)
Confederated International Conferences On the Move to Meaningful Internet Systems (OTM), 938-955
STARTPAGE=938;ENDPAGE=955;TITLE=Confederated International Conferences On the Move to Meaningful Internet Systems (OTM)
On the Move to Meaningful Internet Systems 2008: OTM 2008 Confederated International Conferences (Monterrey, Mexico, November 9-14, 2008), Part II, 938-955
STARTPAGE=938;ENDPAGE=955;TITLE=On the Move to Meaningful Internet Systems 2008: OTM 2008 Confederated International Conferences (Monterrey, Mexico, November 9-14, 2008), Part II
We present a new approach to anomaly-based network intrusion detection for web applications. This approach is based on dividing the input parameters of the monitored web application in two groups: the "regular" and the "irregular" ones, and applying
Autor:
Hadziosmanovic, D., Simionato, L., Bolzoni, D., Zambon, E., Etalle, S., Balzarotti, D., Stolfo, S.J., Cova, M.
Publikováno v:
Research in attacks, intrusions, and defenses (15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings), 354-373
STARTPAGE=354;ENDPAGE=373;TITLE=Research in attacks, intrusions, and defenses (15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings)
Research in Attacks, Intrusions, and Defenses ISBN: 9783642333378
RAID
Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2012), 354-373
STARTPAGE=354;ENDPAGE=373;TITLE=Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2012)
STARTPAGE=354;ENDPAGE=373;TITLE=Research in attacks, intrusions, and defenses (15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings)
Research in Attacks, Intrusions, and Defenses ISBN: 9783642333378
RAID
Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2012), 354-373
STARTPAGE=354;ENDPAGE=373;TITLE=Proceedings of the 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2012)
In recent years we have witnessed several complex and high-impact attacks specifically targeting "binary" protocols (RPC, Samba and, more recently, RDP). These attacks could not be detected by current --- signature-based --- detection solutions, whil
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::15c398d49f6a75c4103d00198fd52700
https://research.tue.nl/nl/publications/8f798b2a-4de2-49a2-a51e-312c0a8dff2a
https://research.tue.nl/nl/publications/8f798b2a-4de2-49a2-a51e-312c0a8dff2a
Publikováno v:
Proceedings of the 25th Large Installation System Administration Conference (LISA 2011), 201-216
STARTPAGE=201;ENDPAGE=216;TITLE=Proceedings of the 25th Large Installation System Administration Conference (LISA 2011)
Proceedings of the 25th Large Installation System Administration Conference (LISA 2011, Boston MA, USA, December 4-9, 2011), 201-215
STARTPAGE=201;ENDPAGE=215;TITLE=Proceedings of the 25th Large Installation System Administration Conference (LISA 2011, Boston MA, USA, December 4-9, 2011)
STARTPAGE=201;ENDPAGE=216;TITLE=Proceedings of the 25th Large Installation System Administration Conference (LISA 2011)
Proceedings of the 25th Large Installation System Administration Conference (LISA 2011, Boston MA, USA, December 4-9, 2011), 201-215
STARTPAGE=201;ENDPAGE=215;TITLE=Proceedings of the 25th Large Installation System Administration Conference (LISA 2011, Boston MA, USA, December 4-9, 2011)
Avatar is a new architecture devised to perform on-the-¿y malware analysis and containment on ordinary hosts; that is, on hosts with no special setup. The idea behind Avatar is to inject the suspected malware with a specially crafted piece of softwa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::314f2f3b3559937e3caf362331503fe8
https://research.utwente.nl/en/publications/edf02c85-d02a-431e-ab89-1be5298ffa71
https://research.utwente.nl/en/publications/edf02c85-d02a-431e-ab89-1be5298ffa71
Publikováno v:
14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011
14th International Symposium on Recent Advances in Intrusion Detection
14th International Symposium on Recent Advances in Intrusion Detection
SCADA (Supervisory Control and Data Acquisition) systems are computer systems used for monitoring and controlling industrial processes such as power plants and power grid systems, water, gas and oil distribution systems, production systems for food,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::3d5a72fe2677f3b7449f08b86f9e0db6
https://research.utwente.nl/en/publications/smart-device-profiling-for-smart-scada(c5d64982-144b-4817-a511-6738e7f69662).html
https://research.utwente.nl/en/publications/smart-device-profiling-for-smart-scada(c5d64982-144b-4817-a511-6738e7f69662).html
Autor:
Hadziosmanovic, D., Bolzoni, D., Hartel, Pieter H., Jha, Somesh, Sommer, Robin, Kreibich, Christian
Publikováno v:
Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010), 500-501
STARTPAGE=500;ENDPAGE=501;TITLE=Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010)
Lecture Notes in Computer Science ISBN: 9783642155116
RAID
STARTPAGE=500;ENDPAGE=501;TITLE=Proceedings of the 13th International Symposium on Recent Advances in Intrusion Detection (RAID 2010)
Lecture Notes in Computer Science ISBN: 9783642155116
RAID
Standard approaches for detecting malicious behaviors, e.g. monitoring network traffic, cannot address process-related threats in SCADA(Supervisory Control And Data Acquisition) systems. These threats take place when an attacker gains user access rig
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bb047dd3dbc8e1af37e199b95527742a
https://research.utwente.nl/en/publications/133bc04a-3966-45ff-ab7e-bf72fb5d09cd
https://research.utwente.nl/en/publications/133bc04a-3966-45ff-ab7e-bf72fb5d09cd
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642043413
RAID
Recent Advances in Intrusion Detection (RAID), 1-20
STARTPAGE=1;ENDPAGE=20;TITLE=Recent Advances in Intrusion Detection (RAID)
Recent Advances in Intrusion Detection: 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, 1-20
STARTPAGE=1;ENDPAGE=20;TITLE=Recent Advances in Intrusion Detection
RAID
Recent Advances in Intrusion Detection (RAID), 1-20
STARTPAGE=1;ENDPAGE=20;TITLE=Recent Advances in Intrusion Detection (RAID)
Recent Advances in Intrusion Detection: 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, 1-20
STARTPAGE=1;ENDPAGE=20;TITLE=Recent Advances in Intrusion Detection
Anomaly-based intrusion detection systems are usually criticized because they lack a classification of attacks, thus security teams have to manually inspect any raised alert to classify it. We present a new approach, Panacea, to automatically and sys
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5cc2367aa13b2e13e48d61a11964f04c
https://doi.org/10.1007/978-3-642-04342-0_1
https://doi.org/10.1007/978-3-642-04342-0_1
Autor:
Bolzoni, D., Etalle, Sandro
Publikováno v:
Intrusion Detection Systems, 1-16
STARTPAGE=1;ENDPAGE=16;TITLE=Intrusion Detection Systems
STARTPAGE=1;ENDPAGE=16;TITLE=Intrusion Detection Systems
Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::dd545f825a9690b6bd3dbdc0e2bc4ae1
https://research.utwente.nl/en/publications/ca5a9db7-0ff6-4069-8a6f-1d930f0e5610
https://research.utwente.nl/en/publications/ca5a9db7-0ff6-4069-8a6f-1d930f0e5610
We present an architecture designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and automatic) anomaly-based analysis of the system output, which provides us
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::5ba8614ebef5e0781c09be4e6cb811ee
https://research.utwente.nl/en/publications/atlantides-automatic-configuration-for-alert-verification-in-network-intrusion-detection-systems(64a2c5c0-56da-4f1b-b6b0-cb22d015c50d).html
https://research.utwente.nl/en/publications/atlantides-automatic-configuration-for-alert-verification-in-network-intrusion-detection-systems(64a2c5c0-56da-4f1b-b6b0-cb22d015c50d).html
Publikováno v:
Proceedings of the 21st Large Installation System Administration Conference (LISA 2007), Dallas TX, USA, November 11-16, 2007, 141-152
STARTPAGE=141;ENDPAGE=152;TITLE=Proceedings of the 21st Large Installation System Administration Conference (LISA 2007), Dallas TX, USA, November 11-16, 2007
Proceedings of the 21st Large Installation System Administration Conference (LISA '07), 141-152
STARTPAGE=141;ENDPAGE=152;TITLE=Proceedings of the 21st Large Installation System Administration Conference (LISA '07)
STARTPAGE=141;ENDPAGE=152;TITLE=Proceedings of the 21st Large Installation System Administration Conference (LISA 2007), Dallas TX, USA, November 11-16, 2007
Proceedings of the 21st Large Installation System Administration Conference (LISA '07), 141-152
STARTPAGE=141;ENDPAGE=152;TITLE=Proceedings of the 21st Large Installation System Administration Conference (LISA '07)
We present an architecture 1 designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and automatic) anomaly-based analysis of the system output, which provides
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::a2a20be8f1a342915a3b8cb2e49d9eff
https://research.tue.nl/nl/publications/76b43572-10ee-45b5-ab48-3d7286705c71
https://research.tue.nl/nl/publications/76b43572-10ee-45b5-ab48-3d7286705c71