Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,237,305 papers from all fields of science
Search
Sign In
Create Free Account
OSSEC
OSSEC is a free, open-source host-based intrusion detection system (HIDS). It performs log analysis, integrity checking, Windows registry monitoring…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
38 relations
Cisco FWSM
Cisco IOS
Cisco PIX
Computer security
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
OSSEC IDS Extension to Improve Log Analysis and Override False Positive or Negative Detections
Diogo Teixeira
,
Leonardo Assunção
,
T. Pereira
,
Silvestre Malta
,
Pedro Pinto
J. Sens. Actuator Networks
2019
Corpus ID: 203219645
Intrusion Detection Systems (IDS) are used to prevent attacks by detecting potential harmful intrusion attempts. Currently, there…
Expand
Review
2018
Review
2018
Interested in learning more about cyber security training ?
Christoph Guenther
2018
Corpus ID: 53977833
This paper explains the basic principles of quantum cryptography and how these principles apply to quantum key distribution. One…
Expand
2017
2017
An experiment in using IMUNES and Conpot to emulate honeypot control networks
Stipe Kuman
,
S. Groš
,
M. Mikuc
International Convention on Information and…
2017
Corpus ID: 24952709
Honeypots are used as a security measure both to divert the attention of a potential attackers intentions and to reveal the…
Expand
2017
2017
Deployment of Intrusion Detection System in Cloud: A Performance-Based Study
Varun Mahajan
,
S. K. Peddoju
IEEE Trustcom/BigDataSE/ICESS
2017
Corpus ID: 38465164
The aim of Cloud Computing environment is to provide low cost, reliable, rapid, on-demand services to the users anywhere and…
Expand
2016
2016
Modelling the Structure of Reusable Solutions for Architecture-Based Quality Evaluation
A. Busch
,
Yves Schneider
,
A. Koziolek
,
Kiana Rostami
,
J. Kienzle
IEEE International Conference on Cloud Computing…
2016
Corpus ID: 14305046
When designing cloud applications many decisions must be made like the selection of the right set of software components. Often…
Expand
2016
2016
IMPROVING ANOMALY DETECTION PROCESS IN COMPUTER NETWORKS HAVING EXISTING IDS USING ADDITIONAL BEHAVIORAL LAYER, OPTIMIZED BACK PROPAGATION NEURAL NETWORK AND MOBILE AGENTS (MULTI CLASS ATTACK…
Bhavin Shah
2016
Corpus ID: 62903588
2015
2015
Security Monitoring in the Cloud: An SLA-Based Approach
V. Casola
,
Alessandra De Benedictis
,
M. Rak
ARES
2015
Corpus ID: 17745249
In this paper we present a monitoring architecture that is automatically configured and activated based on a signed Security SLA…
Expand
2014
2014
An Intelligent Intrusion Prevention System for Cloud Computing (SIPSCC)
Saeed M. Alqahtani
,
Maqbool Al Balushi
,
R. John
International Conference on Computational Science…
2014
Corpus ID: 15883935
Cloud computing is a fast growing IT model for the exchange and delivery of different services through the Internet. However…
Expand
2010
2010
Leveraging ESM platforms for continuous mission-oriented assessment of information assurance
Amy Fedyk
,
M. Atighetchi
,
P. Pal
International Conference on Network and Service…
2010
Corpus ID: 14889120
This paper describes how information collected by enterprise system management (ESM) platforms can be utilized in a novel…
Expand
2008
2008
Working with Rules
Andrew W. Hay
,
D. Cid
,
Rory Bary
,
Stephen Northcutt
2008
Corpus ID: 60461406
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE