Tezmo AB

Displaying 1-9 of 9 results

  • White Papers // Jul 2013

    Network Anomaly Detection : Methods, Systems and Tools

    Network anomaly detection is an important and dynamic research area. Many Network Intrusion Detection methods and Systems (NIDS) have been proposed in the literature. In this paper, the authors provide a structured and comprehensive overview of various facets of network anomaly detection so that a researcher can become quickly familiar...

    Provided By Tezmo AB

  • White Papers // Jul 2013

    NADO : Network Anomaly Detection Using Outlier Approach

    Anomaly detection, which is an important task in any Network Intrusion Detection System (NIDS), enables detection of known as well as unknown attacks. Anomaly detection using outlier identification is a successful network anomaly identification technique. In this paper, the authors describe NADO (Network Anomaly Detection using Outlier Approach), an effective...

    Provided By Tezmo AB

  • White Papers // Jul 2013

    CA-KEP : A Secure CA Based 2-Party Key Exchange Protocol

    Password based Authenticated Key Exchange (PAKE) allows sharing short passwords between two users to agree on a cryptographically strong session key. However, the main challenge in designing this type of protocol is that it must be secure from offline dictionary and various types of man-in-the-middle attacks. In this paper, the...

    Provided By Tezmo AB

  • White Papers // Nov 2012

    AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach

    Coordinated attacks are distributed in nature because they attempt to compromise a target machine from multiple sources. It is important for network defenders and administrators to detect these scans as possible preliminaries to more serious attacks. However, it is very difficult to detect malicious scans based on port specific behavior...

    Provided By Tezmo AB

  • White Papers // Sep 2012

    A New Approach on Rare Association Rule Mining

    Association rule mining is the process of finding some relations among the attributes/attribute values of huge database based on support value. Most existing association mining techniques are developed to generate frequent rules based on frequent itemsets generated on market basket datasets. A common property of these techniques is that they...

    Provided By Tezmo AB

  • White Papers // Oct 2011

    Intersected Coexpressed Subcube Miner: An Effective Triclustering Algorithm

    There are a few triclustering techniques that extract genes which have similar expression patterns for a set of samples across a set of time points. A challenge in triclustering is to take care of both inter temporal and intra temporal gene coherence in the process of tricluster mining. Other challenges...

    Provided By Tezmo AB

  • White Papers // Aug 2011

    Incremental Approaches for Network Anomaly Detection: Existing Solutions and Challenges

    As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems...

    Provided By Tezmo AB

  • White Papers // Oct 2010

    Anomaly Based Intrusion Detection Using Incremental Approach: A Survey

    As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems...

    Provided By Tezmo AB

  • White Papers // Aug 2010

    Surveying Port Scans and Their Detection Methodologies

    Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of IP addresses to find vulnerable hosts to compromise. However, it is also useful for system administrators and other network defenders to detect port scans as possible preliminaries to more serious attacks. It is...

    Provided By Tezmo AB

  • White Papers // Sep 2012

    A New Approach on Rare Association Rule Mining

    Association rule mining is the process of finding some relations among the attributes/attribute values of huge database based on support value. Most existing association mining techniques are developed to generate frequent rules based on frequent itemsets generated on market basket datasets. A common property of these techniques is that they...

    Provided By Tezmo AB

  • White Papers // Jul 2013

    Network Anomaly Detection : Methods, Systems and Tools

    Network anomaly detection is an important and dynamic research area. Many Network Intrusion Detection methods and Systems (NIDS) have been proposed in the literature. In this paper, the authors provide a structured and comprehensive overview of various facets of network anomaly detection so that a researcher can become quickly familiar...

    Provided By Tezmo AB

  • White Papers // Jul 2013

    NADO : Network Anomaly Detection Using Outlier Approach

    Anomaly detection, which is an important task in any Network Intrusion Detection System (NIDS), enables detection of known as well as unknown attacks. Anomaly detection using outlier identification is a successful network anomaly identification technique. In this paper, the authors describe NADO (Network Anomaly Detection using Outlier Approach), an effective...

    Provided By Tezmo AB

  • White Papers // Aug 2011

    Incremental Approaches for Network Anomaly Detection: Existing Solutions and Challenges

    As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems...

    Provided By Tezmo AB

  • White Papers // Aug 2010

    Surveying Port Scans and Their Detection Methodologies

    Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of IP addresses to find vulnerable hosts to compromise. However, it is also useful for system administrators and other network defenders to detect port scans as possible preliminaries to more serious attacks. It is...

    Provided By Tezmo AB

  • White Papers // Jul 2013

    CA-KEP : A Secure CA Based 2-Party Key Exchange Protocol

    Password based Authenticated Key Exchange (PAKE) allows sharing short passwords between two users to agree on a cryptographically strong session key. However, the main challenge in designing this type of protocol is that it must be secure from offline dictionary and various types of man-in-the-middle attacks. In this paper, the...

    Provided By Tezmo AB

  • White Papers // Nov 2012

    AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach

    Coordinated attacks are distributed in nature because they attempt to compromise a target machine from multiple sources. It is important for network defenders and administrators to detect these scans as possible preliminaries to more serious attacks. However, it is very difficult to detect malicious scans based on port specific behavior...

    Provided By Tezmo AB

  • White Papers // Oct 2011

    Intersected Coexpressed Subcube Miner: An Effective Triclustering Algorithm

    There are a few triclustering techniques that extract genes which have similar expression patterns for a set of samples across a set of time points. A challenge in triclustering is to take care of both inter temporal and intra temporal gene coherence in the process of tricluster mining. Other challenges...

    Provided By Tezmo AB

  • White Papers // Oct 2010

    Anomaly Based Intrusion Detection Using Incremental Approach: A Survey

    As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems...

    Provided By Tezmo AB