Arts
Business
Computers
Games
Health
Home
Kids and Teens
News
Recreation
Reference
Regional
Science
Shopping
Society
Sports

   Home / Computers / Security / Intrusion Detection Systems / Research Projects
 
   Web Sites
  • AT&T Information Security Center - The AT&T Information Security Center provides government and corporate customers with design and implementation services in intrusion detection, public-key infrastructure and security consulting.
    www.att.com/isc
  • CERIAS/Purdue University - CERIAS, the world's foremost university center for multidisciplinary research and education in areas of information security (computer security, network security, and communications security), and information assurance.
    www.cerias.purdue.edu
  • CIDER Project - The Cooperative Intrusion Detection Evaluation and Response project is an effort of NSWC Dahlgren, NFR, NSA, the SANS community and other interested parties to locate, document, and improve security software.
    www.nswc.navy.mil/ISSEC/CID
  • COAST Intrusion Detection Pages - These pages aim to present information about intrusion detection and intrusion detection research.
    www.cerias.purdue.edu/coast/intrusion-detection
  • Common Intrusion Detection Framework (CIDF) - Aims to develop protocols and application programming interfaces so that intrusion detection research projects can share information and resources and so that intrusion detection components can be reused in other systems.
    www.isi.edu/gost/cidf
  • Computer immune systems (University of New Mexico) - Four examples of how we are applying ideas from immunology to today's computer security problems are a host based intrusion-detection method, a network based intrusion-detection system, a distributable change-detection algorithm, and a method for intentionally introducing diversity to reduce vulnerability.
    www.cs.unm.edu/~immsec
  • Cost-sensitive intrusion detection(Georgia Institute of Technology) - A Data Mining Approach for Building Cost-sensitive and Light Intrusion Detection Models
    www.cc.gatech.edu/~wenke/project/id.html
  • EMERALD - Event Monitoring Enabling Response To Anomalous Live Disturbances.
    www.sdl.sri.com/emerald/index.html
  • INBOUNDS - Integrated Network Based Ohio University Network Detective Service - INBOUNDS is a network-based, real-time, hierarchical intrusion detection system being developed at Ohio University. INBOUNDS detects suspicious behavior by scrutinizing network information generated by Tcprace, and host data gathered by the monitors of DeSiDeRaTa. INBOUNDS functions in a heterogeneous environment with fault tolerance, very low overhead, and a high degree of scalability.
    zen.ece.ohiou.edu/inbounds
  • Institute for security technology studies(Dartmouth Colledge) - The Institute and its core program on cyber-security and information infrastructure protection research serve as a principal national center for counter-terrorism technology research, development and assessment.
    www.ists.dartmouth.edu
  • Intrusion detection at the MIT Lincoln Lab, Information Systems Technology Group - Information Assurance focusing on techniques for detecting and reacting to intrusions into networked information systems. We have coordinated several evaluations of computer network intrusion detection systems.
    www.ll.mit.edu/IST
  • Intrusion Detection Exchange Format (idwg) - The purpose of the Intrusion Detection Working Group is to define data formats and exchange procedures for sharing information of interest to intrusion detection and response systems, and to management systems which may need to interact with them. The Intrusion Detection Working Group will coordinate its efforts with other IETF Working Groups.
    www.ietf.org/html.charters/idwg-charter.html
  • Intrusion Detection in Columbia University - This project is a data-mining based approach to detecting intruders in computer systems. The project approaches the intrusion detection problem from a data-mining perspective. Large quantities of data are collected from the system and analyzed to build models of normal behavior and intrusion behavior. These models are evaluated on data collected in real time to detect intruders.
    www.cs.columbia.edu/ids
  • Intrusion detection projects at UC Davis - Anomaly Detection in Database Systems, Common Intrusion Detection Framework, Intrusion Detection and Isolation Protocol / IDIP, Intrusion Detection for Large Networks, Misuse Detection and Workshop for Intrusion Detection and Response Data Sharing.
    seclab.cs.ucdavis.edu
  • MAIDS: Mobile Agent Intrusion Detection System (Iowa State University) - MAIDS design and implementation
    latte.cs.iastate.edu/Research/Intrusion/index.html
  • Observing the Observers - Evaluation of NIDSs at the Polytechnical University of Salzburg - This homepage provides general information about IDSs as well as specific information about the project 'OtO'.
    www.students.fh-sbg.ac.at/~messl
  • Reliable Software Laboratory of UCSB - The Reliable Software Group (RSG) works on languages and tools for designing, building, and validating software systems. Specific areas that the group has targeted include concurrent and real-time systems. We are also investigating techniques for increasing the security of computer systems, with particular emphasis on analyzing encryption protocols using machine aided formal verification techniques, modeling and analyzing covert channels, modeling and detecting computer intrusions, analyzing mobile code and Web browsers for security violations, and approaches to secure Internet computing with unsecure applications.
    www.cs.ucsb.edu/~rsg/STAT
  • ResearchIndex, IDS section - ResearchIndex is a scientific literature digital library that aims to improve the dissemination and feedback of scientific literature, and to provide improvements in functionality, usability, availability, cost, comprehensiveness, efficiency, and timeliness.
    citeseer.nj.nec.com/Security/IntrusionDetection
  • Secure & Reliable Systems Lab at SUNY Stony Brook - Our research is aimed broadly at developing new approaches, technologies and tools for improving the security and reliability of networks and distributed software systems.
    seclab.cs.sunysb.edu
  • Secure and Highly Available Networking Group(NCSU) - SHANG's main objective is to build a high-confidence networking infrastructure system, which involves a wide range of research issues in the area of Network Security, Network Management, and Networking Software Development.
    shang.csc.ncsu.edu/index.html
  • The Center for Secure and Dependable Software(University of Idaho) - Hummer is a distributed component for any Intrusion Detection System ; Magpie is a hierarchical network of lightweight, mobile, and adaptive tools designed to both investigate and guard against intrusions.
    www.csds.uidaho.edu
  • Recent Advances in Intrusion Detection - The RAID workshop series is an annual event dedicated to the sharing of information related to the intrusion-detection area.
    www.raid-symposium.org

Google
1995-2015 © Stunning, Inc.