3 resultados para proceeding commenced by originating application

em Nottingham eTheses


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The maximum numbers of distinct one- and two-electron integrals that arise in calculating the electronic energy of a molecule are discussed. It is shown that these may be calculated easily using the character table of the symmetry group of the set of basis functions used to express the wave function. Complications arising from complex group representations and from a conflict of symmetry between the basis set and the nuclear configuration are considered and illustrated by examples.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of false alerts sent by the attacker. Although these types of attacks are very hard to stop completely, our aim is to present techniques that improve alert throughput and capacity to such an extent that the resources required to successfully mount the attack become prohibitive. The key idea presented is to combine a token bucket filter with a realtime correlation algorithm. The proposed algorithm throttles alert output from the IDS when an attack is detected. The attack graph used in the correlation algorithm is used to make sure that alerts crucial to forming strategies are not discarded by throttling.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of false alerts sent by the attacker. Although these types of attacks are very hard to stop completely, our aim is to present techniques that improve alert throughput and capacity to such an extent that the resources required to successfully mount the attack become prohibitive. The key idea presented is to combine a token bucket filter with a realtime correlation algorithm. The proposed algorithm throttles alert output from the IDS when an attack is detected. The attack graph used in the correlation algorithm is used to make sure that alerts crucial to forming strategies are not discarded by throttling.