jasminecorp.net directory
Updated Blogs
Computer Support Blog
Essensial Software for Web Based Support
HP Server and Desktop
HP ILO - Remote Tech-Support Software
More .....



 
 

| Add Search | Advertise With JCSearch | Suggest a Site

Search the Web


Search Results

Research
Directory > Computers > Security > Intrusion Detection Systems > Research

Web Sitesi

Survivability Research and Analysis (CERT)
Research focuses on methods of improving the technical approach of identifying and preventing
security flaws, limiting the damage from attacks, and ensuring that systems continue to provide
essential services despite of compromises or failures.

http://www.cert.org/nav/index_purple.html
Reviews Rating: Not yet Rated Whois Check

Intrusion Detection User Group
A group mailing focusing on security information management, intrusion response, intrusion
detection, intrusion prevention, intrusion management and honeynets/honeypots.

http://idug.cryptojail.net
Reviews Rating: Not yet Rated Whois Check

System Design Laboratory Intrusion Detection
Research institute actively involved in intrusion-detection research since 1983. Research focuses
on EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances, a system designed
to detect and respond to network attacks.

http://www.sdl.sri.com/programs/intrusion/
Reviews Rating: Not yet Rated Whois Check

M-Correlator
A mission-impact-based approach to INFOSEC alarm correlation.
http://www.sdl.sri.com/papers/mcorrelator/
Reviews Rating: Not yet Rated Whois Check

Recent Advances in Intrusion Detection Symposium
International Symposium on Recent Advances in Intrusion Detection. Held in conjunction with
ESORICS 2004, September 15-17, 2004. The RAID International Symposium series is intended to
advance the field of intrusion detection by promoting the exchange of ideas on a broad range of
topics, bringing together leading experts from academia, government, and industry to discuss
state-of-the-art intrusion detection technologies and issues from research and commercial
perspectives.

http://raid04.eurecom.fr
Reviews Rating: Not yet Rated Whois Check

Thor
Research project that utilizes network attack variations to make more precise statements about the
detection capabilities of an IDS.

http://thor.cryptojail.net
Reviews Rating: Not yet Rated Whois Check

MInnesota Intrusion Detection System (MINDS)
Research project focused on the development of high performance data mining algorithms and tools
that will provide support required to analyze the massive data sets generated by various processes
that monitor computing and information systems.

http://www.cs.umn.edu/research/minds/
Reviews Rating: Not yet Rated Whois Check

Intrusion Detection Research Group(NCSU)
The Intrusion Detection (ID) Research Group at NC State
University was formed by Dr. Peng Ning in August 2002.

http://discovery.csc.ncsu.edu/index.html
Reviews Rating: Not yet Rated Whois Check

Observing the Observers - Evaluation of NIDSs at the Polytechnical University of Salzburg
This homepage provides general information about IDSs as well as specific information about the
project 'OtO'.

http://www.students.fh-sbg.ac.at/~messl/
Reviews Rating: Not yet Rated Whois Check

Common Intrusion Detection Framework (CIDF)
Aims to develop protocols and application programming interfaces so that intrusion detection
research projects can share information and resources and so that intrusion detection components
can be reused in other systems.

http://www.isi.edu/gost/cidf/
Reviews Rating: Not yet Rated Whois Check

Intrusion detection projects at UC Davis
Anomaly Detection in Database Systems, Common Intrusion Detection Framework, Intrusion Detection
and Isolation Protocol / IDIP, Intrusion Detection for Large Networks, Misuse Detection and
Workshop for Intrusion Detection and Response Data Sharing.

http://seclab.cs.ucdavis.edu/
Reviews Rating: Not yet Rated Whois Check

Cost-sensitive intrusion detection(Georgia Institute of Technology)
A Data Mining Approach for Building Cost-sensitive and Light Intrusion Detection Models
http://www.cc.gatech.edu/~wenke/project/id.html
Reviews Rating: Not yet Rated Whois Check

The Center for Secure and Dependable Software(University of Idaho)
Hummer is a distributed component for any Intrusion Detection System ; Magpie is a hierarchical
network of lightweight, mobile, and adaptive tools designed to both investigate and guard against
intrusions.

http://www.csds.uidaho.edu/
Reviews Rating: Not yet Rated Whois Check

MAIDS: Mobile Agent Intrusion Detection System (Iowa State University)
MAIDS design and implementation.
http://latte.cs.iastate.edu/Research/Intrusion/index.html
Reviews Rating: Not yet Rated Whois Check

ResearchIndex, IDS section
ResearchIndex is a scientific literature digital library that aims to improve the dissemination and
feedback of scientific literature, and to provide improvements in functionality, usability,
availability, cost, comprehensiveness, efficiency, and timeliness.

http://citeseer.nj.nec.com/Security/IntrusionDetection/
Reviews Rating: Not yet Rated Whois Check

Computer immune systems (University of New Mexico)
Four examples of how we are applying ideas from immunology to today's computer security problems
are a host based intrusion-detection method, a network based intrusion-detection system, a
distributable change-detection algorithm, and a method for intentionally introducing diversity to
reduce vulnerability.

http://www.cs.unm.edu/~immsec/
Reviews Rating: Not yet Rated Whois Check

Intrusion Detection Exchange Format (idwg)
The purpose of the Intrusion Detection Working Group is to define data formats and exchange
procedures for sharing information of interest to intrusion detection and response systems, and to
management systems which may need to interact with them. The Intrusion Detection Working Group
will coordinate its efforts with other IETF Working Groups.

http://www.ietf.org/html.charters/idwg-charter.html
Reviews Rating: Not yet Rated Whois Check

COAST Intrusion Detection Pages
Perdue University's clearinghouse for intrusion detection information. Includes overviews, policy,
detection methods, and tools.

http://www.cerias.purdue.edu/coast/intrusion-detection/
Reviews Rating: Not yet Rated Whois Check

INBOUNDS - Integrated Network Based Ohio University Network Detective Service
INBOUNDS is a network-based, real-time, hierarchical intrusion detection system being developed at
Ohio University. INBOUNDS detects suspicious behavior by scrutinizing network information generated
by Tcprace, and host data gathered by the monitors of DeSiDeRaTa. INBOUNDS functions in a
heterogeneous environment with fault tolerance, very low overhead, and a high degree of
scalability.

http://zen.ece.ohiou.edu/inbounds
Reviews Rating: Not yet Rated Whois Check

CIDER Project
The Cooperative Intrusion Detection Evaluation and Response project is an effort of NSWC Dahlgren,
NFR, NSA, the SANS community and other interested parties to locate, document, and improve
security software.

http://www.nswc.navy.mil/ISSEC/CID/
Reviews Rating: Not yet Rated Whois Check

EMERALD (Event Monitoring Enabling Responses to Anomalous Live Disturbances)
Emeral represents state-of-the art in research and development of systems and components for
anomaly and misuse detection in computer systems and networks.

http://www.sdl.sri.com/emerald/index.html
Reviews Rating: Not yet Rated Whois Check

Intrusion Detection in Columbia University
This project is a data-mining based approach to detecting intruders in computer systems. The
project approaches the intrusion detection problem from a data-mining perspective. Large
quantities of data are collected from the system and analyzed to build models of normal behavior
and intrusion behavior. These models are evaluated on data collected in real time to detect
intruders.

http://www.cs.columbia.edu/ids/
Reviews Rating: Not yet Rated Whois Check

Intrusion detection at the MIT Lincoln Lab, Information Systems Technology Group
Information Assurance focusing on techniques for detecting and reacting to intrusions into
networked information systems. We have coordinated several evaluations of computer network
intrusion detection systems.

http://www.ll.mit.edu/IST/
Reviews Rating: Not yet Rated Whois Check

Reliable Software Laboratory of UCSB
The Reliable Software Group (RSG) works on languages and tools for designing, building, and
validating software systems. Specific areas that the group has targeted include concurrent and
real-time systems. We are also investigating techniques for increasing the security of computer
systems, with particular emphasis on analyzing encryption protocols using machine aided formal
verification techniques, modeling and analyzing covert channels, modeling and detecting computer
intrusions, analyzing mobile code and Web browsers for security violations, and approaches to
secure Internet computing with unsecure applications.

http://www.cs.ucsb.edu/~rsg/STAT/
Reviews Rating: Not yet Rated Whois Check

Recent Advances in Intrusion Detection
The RAID workshop series is an annual event dedicated to the sharing of information related to the
intrusion-detection area.

http://www.raid-symposium.org/
Reviews Rating: Not yet Rated Whois Check

 


Jasminecorp.net directory is based on the Open Directory and is being modified by Jasminecorp.

©2004 Jasmine Computers Inc.

Click here to subscribe for Jasminecorp's product News.

Home | JCBid |Software Development | Domain Registration | Hosting | Web Designing | Buy Books | Advertise with JCSearch | Whois | IP Locator | Add Search | Shopping | Store | Free Blogs | Free GuestBook | Free E-Cards | Free Games | Free Tutorials | Set as Home | Add to Favorite | Suggest a Site | Directory | Our Portfolio | Terms of service | Free quote | Tell a Friend | Special Offer | Job Opportunities | games | Usenet Groups

Submit a Site to Jasminecorp.net Directory || Advertise with us

 

Help build the largest human-edited directory on the web.
Submit a Site - Open Directory Project - Become an Editor
Get a Domain Name:
.com .us .info
.org .in .name
.net .biz .asia