Tezmo AB

Displaying 1 - 9 of 9 results

  • CA-KEP : A Secure CA Based 2-Party Key Exchange Protocol

    White Papers // Jul 2013 // provided by Tezmo AB

    Password based Authenticated Key Exchange (PAKE) allows sharing short passwords between two users to agree on a cryptographically strong session key. However, the main challenge in designing this type of protocol is that it must be secure from offline dictionary and various types of man-in-the-middle attacks. In this paper, the ...

    Download Now
  • NADO : Network Anomaly Detection Using Outlier Approach

    White Papers // Jul 2013 // provided by Tezmo AB

    Anomaly detection, which is an important task in any Network Intrusion Detection System (NIDS), enables detection of known as well as unknown attacks. Anomaly detection using outlier identification is a successful network anomaly identification technique. In this paper, the authors describe NADO (Network Anomaly Detection using Outlier Approach), an effective ...

    Download Now
  • Network Anomaly Detection : Methods, Systems and Tools

    White Papers // Jul 2013 // provided by Tezmo AB

    Network anomaly detection is an important and dynamic research area. Many Network Intrusion Detection methods and Systems (NIDS) have been proposed in the literature. In this paper, the authors provide a structured and comprehensive overview of various facets of network anomaly detection so that a researcher can become quickly familiar ...

    Download Now
  • AOCD: An Adaptive Outlier Based Coordinated Scan Detection Approach

    White Papers // Nov 2012 // provided by Tezmo AB

    Coordinated attacks are distributed in nature because they attempt to compromise a target machine from multiple sources. It is important for network defenders and administrators to detect these scans as possible preliminaries to more serious attacks. However, it is very difficult to detect malicious scans based on port specific behavior ...

    Download Now
  • A New Approach on Rare Association Rule Mining

    White Papers // Sep 2012 // provided by Tezmo AB

    Association rule mining is the process of finding some relations among the attributes/attribute values of huge database based on support value. Most existing association mining techniques are developed to generate frequent rules based on frequent itemsets generated on market basket datasets. A common property of these techniques is that they ...

    Download Now
  • Intersected Coexpressed Subcube Miner: An Effective Triclustering Algorithm

    White Papers // Oct 2011 // provided by Tezmo AB

    There are a few triclustering techniques that extract genes which have similar expression patterns for a set of samples across a set of time points. A challenge in triclustering is to take care of both inter temporal and intra temporal gene coherence in the process of tricluster mining. Other challenges ...

    Download Now
  • Incremental Approaches for Network Anomaly Detection: Existing Solutions and Challenges

    White Papers // Aug 2011 // provided by Tezmo AB

    As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems ...

    Download Now
  • Anomaly Based Intrusion Detection Using Incremental Approach: A Survey

    White Papers // Oct 2010 // provided by Tezmo AB

    As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems ...

    Download Now
  • Surveying Port Scans and Their Detection Methodologies

    White Papers // Aug 2010 // provided by Tezmo AB

    Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of IP addresses to find vulnerable hosts to compromise. However, it is also useful for system administrators and other network defenders to detect port scans as possible preliminaries to more serious attacks. It is ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?