Intrusion detection projects at UC Davis
Anomaly Detection in Database Systems, Common Intrusion Detection Framework, Intrusion Detection and Isolation Protocol / IDIP, Intrusion Detection for Large Networks, Misuse Detection and Workshop for Intrusion Detection and Response Data Sharing.
Intrusion Detection Research Group(NCSU)
The Intrusion Detection (ID) Research Group at NC State University was formed by Dr. Peng Ning in August 2002.
Intrusion Detection User Group
A group mailing focusing on security information management, intrusion response, intrusion detection, intrusion prevention, intrusion management and honeynets/honeypots.
M-Correlator
A mission-impact-based approach to INFOSEC alarm correlation.
MInnesota Intrusion Detection System (MINDS)
Research project focused on the development of high performance data mining algorithms and tools that will provide support required to analyze the massive data sets generated by various processes that monitor computing and information systems.
Recent Advances in Intrusion Detection Symposium 2004
International Symposium on Recent Advances in Intrusion Detection. Held in conjunction with ESORICS 2004, September 15-17, 2004. The RAID International Symposium series is intended to advance the field of intrusion detection by promoting the exchange of ideas on a broad range of topics, bringing together leading experts from academia, government, and industry to discuss state-of-the-art intrusion detection technologies and issues from research and commercial perspectives.
Reliable Software Laboratory of UCSB
The Reliable Software Group (RSG) works on languages and tools for designing, building, and validating software systems. Specific areas that the group has targeted include concurrent and real-time systems. We are also investigating techniques for increasing the security of computer systems, with particular emphasis on analyzing encryption protocols using machine aided formal verification techniques, modeling and analyzing covert channels, modeling and detecting computer intrusions, analyzing mobile code and Web browsers for security violations, and approaches to secure Internet computing with unsecure applications.
ResearchIndex, IDS section
ResearchIndex is a scientific literature digital library that aims to improve the dissemination and feedback of scientific literature, and to provide improvements in functionality, usability, availability, cost, comprehensiveness, efficiency, and timeliness.
Security Incident Fusion Tools (SIFT)
Security Incident Fusion Tools (SIFT) is an integrated framework for evaluating the security of an entire computer network on a single screen. The project attempts to address the need to discover undetected security incidents.
Survivability Research and Analysis (CERT)
Research focuses on methods of improving the technical approach of identifying and preventing security flaws, limiting the damage from attacks, and ensuring that systems continue to provide essential services despite of compromises or failures.
System Design Laboratory Intrusion Detection
Research institute actively involved in intrusion-detection research since 1983. Research focuses on EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances, a system designed to detect and respond to network attacks.
Thor
Research project that utilizes network attack variations to make more precise statements about the detection capabilities of an IDS.
Results: Previous 1 2 3 4