Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Snort
biblio
An IDS Rule Redundancy Verification
Submitted by grigby1 on Fri, 04/09/2021 - 10:33am
Syntactics
Snort rule combinations
Snort community
public rulesets
open-source IDS system
network security software
IDS rule verification
IDS rule redundancy verification
commented rules
anomaly network traffics
Snort
IDS
resilience
tools
Semantics
Redundancy
Payloads
telecommunication traffic
composability
intrusion detection system
Protocols
computer network security
Resiliency
pubcrawl
IP networks
biblio
Performance Analysis of IDS Snort and IDS Suricata with Many-Core Processor in Virtual Machines Against Dos/DDoS Attacks
Submitted by grigby1 on Fri, 04/09/2021 - 10:32am
Central Processing Unit
testing
virtual machine
Performance analysis
IDS
Telecommunications
transport protocols
DoS
denial-of-service attack
operating systems (computers)
IDS Snort version
IDS Suricata
many-core processor
physical machine
Snort
Suricata
TCP Flood attack test
IP networks
resilience
DDoS
virtual machines
Virtual machining
DDoS Attacks
multiprocessing systems
telecommunication traffic
composability
Wireless communication
intrusion detection system
wireless sensor networks
microprocessor chips
computer network security
Resiliency
pubcrawl
biblio
Design and Implementation of NIDS Notification System Using WhatsApp and Telegram
Submitted by grigby1 on Tue, 03/09/2021 - 1:39pm
notification platform
whatsapp
Telegram
telecommunication traffic
SYN flood attacks
SSH brute force attacks
social networking (online)
Social network services
Snort
Servers
security of data
real-time systems
pubcrawl
policy-based governance
packet data traffic
administrator
Notification
NIDS notification System
NIDS
network intrusion detection system
IP networks
Intrusion Detection
Human Factors
Human behavior
Force
Floods
Death attacks
brute force attacks
attack time
attack port
biblio
Quality of Service (QoS) Comparison Analysis of Snort IDS and Bro IDS Application in Software Define Network (SDN) Architecture
Submitted by grigby1 on Tue, 12/01/2020 - 12:45pm
Snort
QoS measurement
quality of service
resilience
Resiliency
SDN
SDN architecture
service comparison analysis
signature based detection method
QoS
Snort IDS
software define network architecture
software defined networking
telecommunication traffic
testing
Throughput
tools
pubcrawl
packet loss parameters
Packet loss
network quality
network activity
memory usage
intrusion detection system
IDS
existing network traffic
delays
CPU usage
computer network security
composability
bro IDS application
Bro
anomaly based detection method
biblio
An Ontology-Driven Approach to Automating the Process of Integrating Security Software Systems
Submitted by aekwall on Mon, 08/24/2020 - 11:40am
security orchestration platform
ontology-driven approach
open systems
Organizations
pubcrawl
Resiliency
SecOrP
security of data
security orchestration
Ontology
security software systems
security system
security systems integration processes
Semantics
Snort
Splunk
Task Analysis
DDoS Attack
Human behavior
Expert Systems and Security
Australia
automated integration process
Automated Response Actions
composability
Computer crime
cybersecurity attacks
Scalability
distributed denial of service attacks
incident response process
interoperability
Limacharlie
OnSOAP
Ontologies
ontologies (artificial intelligence)
biblio
Intrusion Detection System Model Implementation against DDOS attacks
Submitted by aekwall on Mon, 06/29/2020 - 11:46am
prevention systems
DDoS attack detection
SNORT bandwidth traffic analysis
Snort
intrusion detection system model implementation
intrusion detection methods
intrusion actions
firewall policy
DDoS Attacks
computer installation
DDoS
Metrics
composability
pubcrawl
Human behavior
Resiliency
telecommunication traffic
firewalls
IDS
biblio
Efficient Memristor-Based Architecture for Intrusion Detection and High-Speed Packet Classification
Submitted by grigby1 on Tue, 11/19/2019 - 2:41pm
composability
deep packet inspection
hardware architectures
memristor crossbars
Metrics
network security
packet classification
power grid vulnerability analysis
pubcrawl
range matching
resilience
Resiliency
router
Snort
string matching
biblio
Performance Analysis of IDS with Honey Pot on New Media Broadcasting
Submitted by grigby1 on Mon, 11/19/2018 - 11:24am
security tools
network intrusion detection system
new media broadcasting
operating systems (computers)
pubcrawl
public domain software
resilience
Resiliency
Scalability
Linux open source operating system
Servers
Snort
TCP Flood
transport protocols
UDP flood
WiFi
Wireless fidelity
Human Factors
computer network security
denial of service
digital multimedia broadcasting
DoS
firewalls
Floods
Honey Pot
honey pots
Broadcasting
ICMP Flood
IDS
Intrusion Detection Systems
IPTV
IPTV system
LAN network
Linux
biblio
Integration of Network Intrusion Detection Systems and Honeypot Networks for Cloud Security
Submitted by grigby1 on Wed, 05/09/2018 - 1:53pm
Malware Analysis
Snort
Signature-based detection
Servers
sandboxing environment
sandboxing
pubcrawl
Ports (Computers)
Policy-Governed systems
Policy-Governed Secure Collaboration
Policy
openstack
NIDS module
network intrusion detection systems
network intrusion detection system
Cloud Computing
malware
malicious attacks
invasive software
Intrusion Detection
honeypot networks
Honeypot Network
Dynamic Malware Analysis
cost services
computer architecture
composability
collaboration
cloud-computing technology
Cloud Security
cloud environment
biblio
A factor-searching-based multiple string matching algorithm for intrusion detection
Submitted by BrandonB on Fri, 05/01/2015 - 7:38am
network intrusion detection systems
URL blacklist
Time complexity
synthetic rules
succinct hash table
string matching
space-efficient multiple string matching algorithm BVM
space-efficient
space complexity
Snort
security of data
SBOM
SBDM
pattern matching
AC
multiple string matching
matching speed
Intrusion Detection
huge memory usage
factor-searching-based multiple string matching algorithm
factor searching-based algorithms
ClamAV
bit-vector
automata-based multiple string matching algorithms
automata theory
automata
arrays
1
2
next ›
last »