Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,787,835 papers from all fields of science
Search
Sign In
Create Free Account
Snort
Snort is a free and open source network intrusion prevention system (NIPS) and network intrusion detection system (NIDS) created by Martin Roesch in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
47 relations
ACARM-ng
ARP spoofing
Aanval
Alert correlation
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
An OpenFlow-based collaborative intrusion prevention system for cloud networking
N. Huang
,
C. Wang
,
I-Ju Liao
,
Chengtah Lin
,
Chia-Nan Kao
IEEE International Conference on Communication…
2015
Corpus ID: 18803219
Software-Defined Networking (SDN) is an emerging architecture that is ideal for today's high-bandwidth, dynamic network…
Expand
2011
2011
SCADA Honeynets: The attractiveness of honeypots as critical infrastructure security tools for the detection and analysis of advanced threats
S. Wade
2011
Corpus ID: 108840329
Since the Stuxnet worm was discovered by a Belarusian security company, there has been a growing awareness of and a renewed…
Expand
2007
2007
SpyCon: Emulating User Activities to Detect Evasive Spyware
M. Chandrasekaran
,
V. Sankaranarayanan
,
S. Upadhyaya
IEEE International Performance, Computing, and…
2007
Corpus ID: 510784
The success of any spyware is determined by its ability to evade detection. Although traditional detection methodologies…
Expand
2006
2006
Towards the automatic generation of mobile agents for distributed intrusion detection system
Yanxin Wang
,
S. Behera
,
+5 authors
Mark Slagell
Journal of Systems and Software
2006
Corpus ID: 9594247
2005
2005
On Interactive Internet Traffic Replay
Seung-Sun Hong
,
S. F. Wu
International Symposium on Recent Advances in…
2005
Corpus ID: 15858229
In this paper, we introduce an interactive Internet traffic replay tool, TCPopera. TCPopera tries to accomplish two primary goals…
Expand
Highly Cited
2002
Highly Cited
2002
The Effect of Identifying Vulnerabilities and Patching Software on the Utility of Network Intrusion Detection
R. Lippmann
,
S. Webster
,
Douglas Stetson
International Symposium on Recent Advances in…
2002
Corpus ID: 3082390
Vulnerability scanning and installing software patches for known vulnerabilities greatly affects the utility of network-based…
Expand
2002
2002
Design and analysis of a layer seven network processor accelerator using reconfigurable logic
G. Memik
,
S. Memik
,
W. Mangione-Smith
Proceedings. 10th Annual IEEE Symposium on Field…
2002
Corpus ID: 2239801
In this paper, we present an accelerator that is designed to improve performance of network processing applications, particularly…
Expand
2001
2001
Heterogeneous Sensor Correlation: A Case Study of Live Traffic Analysis
D. Andersson
,
Martin W. Fong
,
A. Valdes
2001
Corpus ID: 14159625
As enterprises deploy multiple intrusion detection sensors at key points in their networks, the issue of correlating messages…
Expand
Highly Cited
1987
Highly Cited
1987
The influence of habitat and group characteristics on the alarm and flight response of white-tailed deer
K. LaGory
Animal Behaviour
1987
Corpus ID: 53199011
Highly Cited
1983
Highly Cited
1983
A major revision of iron meteorite cooling rates—An experimental study of the growth of the Widmanstätten pattern
C. Narayan
,
J. Goldstein
1983
Corpus ID: 13982281
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE