Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
A Survey On Intrusion Detection Approaches, A Murali M. Rao
A Survey On Intrusion Detection Approaches, A Murali M. Rao
International Conference on Information and Communication Technologies
Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Usages of computer network services are tremendously increasing day by day and at the same time intruders are also playing a major role to deny network services, compromising the crucial services for Email, FTP and Web. Realizing the importance of the problem due to intrusions, many researchers have taken up research in this area and have proposed several solutions. It has come to a stage to take a stock of the research results and project a comprehensive view so …
Discovering The Potential For Advancements In Intrusion Detection Systems, Kenneth J. Buonforte
Discovering The Potential For Advancements In Intrusion Detection Systems, Kenneth J. Buonforte
Honors Theses
An intrusion detection system (IDS) is a collection of monitors strategically placed on a network or individual host in order to detect anomalous behavior. Since James Anderson introduced one of the first frameworks for an intrusion detection system in [1]. researchers have extended the capabilities of these systems. IDSs take many forms, from systems as basic as command line audit logs to those that emulate the defense mechanisms of the human immune system. However, as intrusion detection has evolved, scientists and administrators alike are beginning to question the need for this technology due to its lack of quantifiable performance and …
Self-Similarity In Network Traffic, Francisco Chinchilla
Self-Similarity In Network Traffic, Francisco Chinchilla
Honors Theses
It is critical to properly understand the nature of network traffic in order to effectively design models describing network behavior. These models are usually used to simulate network traffic, which in turn are used to construct congestion control techniques, perform capacity planning studies, and/or evaluate the behavior of new protocols. Using the wrong models could lead to potentially serious problems such as delayed packet transmissions or an increase in packet drop rates.
Traditionally, packet arrivals were assumed to follow a Poisson arrival process. Although Poisson processes have several properties that make them easy to work with, they do not accurately …
Air Force Rotc At The University Of Richmond, 1951-1957, Robert J. Dandridge
Air Force Rotc At The University Of Richmond, 1951-1957, Robert J. Dandridge
Honors Theses
In the summer of 1950, after the seriousness of the Korean conflict had become evident, a special committee appointed three years earlier by the Executive Committee of the Board of Trustees was reactivated for the purpose of considering "the feasibility of applying for a Reserve Office Training Corps unit" for the University of Richmond. This special committee, called the ROTC Committee, after thorough study, rendered a unanimous recommendation to the Board that a unit of Army ROTC be applied for. The application was completed and mailed to the Department of the Army. Approval of the application was not long in …