Corpus ID: 170253965

Framework para detección de intrusos usando DeLP

@inproceedings{Guasco2007FrameworkPD,
  title={Framework para detecci{\'o}n de intrusos usando DeLP},
  author={Luciano M. Guasco and Javier Echaiz and Jorge Ardenghi},
  year={2007}
}
Uno de los principales problemas que se presentan en las redes de mediana y gran escala es la dificultad para monitorear y detectar vulnerabilidades que puedan ser explotadas. Tanto los recursos que se comparten en una red, como los principales hosts que intervienen en la misma quedan expuestos a posibles ataques que pueden causar perdidas considerables en los datos. En esta ĺinea de investigacion se pretende desarrollar un framework de deteccion de intrusos, donde todos los hosts que… Expand

References

SHOWING 1-7 OF 7 REFERENCES
Defeasible Logic Programming: An Argumentative Approach
TLDR
The work reported here introducesdefeasible Logic Programming (DeLP), a formalism that combines results of Logic Programming and Defeasible Argumentation and a defeasible argumentation inference mechanism for warranting the entailed conclusions. Expand
MulVAL: A Logic-based Network Security Analyzer
TLDR
MulVAL is an end-to-end framework and reasoning system that conducts multihost, multistage vulnerability analysis on a network and can reason about 84% of the Red Hat bugs reported in OVAL, a formal vulnerability definition language. Expand
Extending an SSI Cluster for Resource Discovery in Grid Computing
TLDR
A resource discovery system for grid computing with fault-tolerant capabilities starting from an SSI clustering operating system that uses dynamic leader-determination and registration mechanisms to automatically recover from nodes and network failures. Expand
Snort Intrusion Detection System Based on Data Mining
This paper puts forward a model of Snort intrusion detection system based on data mining technology. It takes the frame of Snort intrusion detection system as the foundation and makes use of dataExpand
Centralized authentication with Kerberos 5, Part I
The road to single sign-on begins with a robust authentication server. This series gives you a recipe for rolling out the well-tested Kerberos suite.