The RAID workshop series is an annual event dedicated to the sharing of information related to the intrusion-detection area.
The Reliable Software Group (RSG) works on languages and tools for designing, building, and validating software systems. Specific areas that the group has targeted include concurrent and real-time systems. We are also investigating techniques for increasing the security of computer systems, with particular emphasis on analyzing encryption protocols using machine aided formal verification techniques, modeling and analyzing covert channels, modeling and detecting computer intrusions, analyzing mobile code and Web browsers for security violations, and approaches to secure Internet computing with unsecure applications.
Information Assurance focusing on techniques for detecting and reacting to intrusions into networked information systems. We have coordinated several evaluations of computer network intrusion detection systems.
This project is a data-mining based approach to detecting intruders in computer systems. The project approaches the intrusion detection problem from a data-mining perspective. Large quantities of data are collected from the system and analyzed to build models of normal behavior and intrusion behavior. These models are evaluated on data collected in real time to detect intruders.
The Cooperative Intrusion Detection Evaluation and Response project is an effort of NSWC Dahlgren, NFR, NSA, the SANS community and other interested parties to locate, document, and improve security software.
Four examples of how we are applying ideas from immunology to today's computer security problems are a host based intrusion-detection method, a network based intrusion-detection system, a distributable change-detection algorithm, and a method for intentionally introducing diversity to reduce vulnerability.
Hummer is a distributed component for any Intrusion Detection System ; Magpie is a hierarchical network of lightweight, mobile, and adaptive tools designed to both investigate and guard against intrusions.
A Data Mining Approach for Building Cost-sensitive and Light Intrusion Detection Models
Anomaly Detection in Database Systems, Common Intrusion Detection Framework, Intrusion Detection and Isolation Protocol / IDIP, Intrusion Detection for Large Networks, Misuse Detection and Workshop for Intrusion Detection and Response Data Sharing.
The Intrusion Detection (ID) Research Group at NC State University was formed by Dr. Peng Ning in August 2002.