Page 1

Displaying 1 – 15 of 15

Showing per page

Classification Trees as a Technique for Creating Anomaly-Based Intrusion Detection Systems

Jecheva, Veselina, Nikolova, Evgeniya (2009)

Serdica Journal of Computing

Intrusion detection is a critical component of security information systems. The intrusion detection process attempts to detect malicious attacks by examining various data collected during processes on the protected system. This paper examines the anomaly-based intrusion detection based on sequences of system calls. The point is to construct a model that describes normal or acceptable system activity using the classification trees approach. The created database is utilized as a basis for distinguishing...

Design of a rule-driven architecture for a generic T-norm.

Enrique Frías, Julio Gutiérrez, Felipe Fernández (2000)

Mathware and Soft Computing

Rule-Driven processing has been proved as a way of achieving high speed in fuzzy hardware. Up to now, rule-driven architectures were designed to work with minimum or product as T-norm. This paper proposes two new rule-driven models designed for any T-norm (programmable T-norm) and any kind of membership function. The first one gives a valid theory for rule-driven processing with programmable T-norm and establishes the background for the second model. The second model has been designed taking into...

Is GPU the future of Scientific Computing ?

Georges-Henri Cottet, Jean-Matthieu Etancelin, Franck Perignon, Christophe Picard, Florian De Vuyst, Christophe Labourdette (2013)

Annales mathématiques Blaise Pascal

These past few years, new types of computational architectures based on graphics processors have emerged. These technologies provide important computational resources at low cost and low energy consumption. Lots of developments have been done around GPU and many tools and libraries are now available to implement efficiently softwares on those architectures.This article contains the two contributions of the mini-symposium about GPU organized by Loïc Gouarin (Laboratoire de Mathématiques d’Orsay),...

Simulation of transient performance measures for stiff markov chains

Abdelaziz Nasroallah (2010)

RAIRO - Operations Research

We consider the simulation of transient performance measures of high reliable fault-tolerant computer systems. The most widely used mathematical tools to model the behavior of these systems are Markov processes. Here, we deal basically with the simulation of the mean time to failure (MTTF) and the reliability, R(t), of the system at time t. Some variance reduction techniques are used to reduce the simulation time. We will combine two of these techniques: Importance Sampling and Conditioning...

String distances and intrusion detection: Bridging the gap between formal languages and computer security

Danilo Bruschi, Giovanni Pighizzini (2006)

RAIRO - Theoretical Informatics and Applications

In this paper we analyze some intrusion detection strategies proposed in the literature and we show that they represent the various facets of a well known formal languages problem: computing the distance between a string x and a language L. In particular, the main differences among the various approaches adopted for building intrusion detection systems can be reduced to the characteristics of the language L and to the notion of distance adopted. As a further contribution we will also show that from...

Currently displaying 1 – 15 of 15

Page 1