RAID
13 years 10 months ago
2001 Springer
Abstract. This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterpris...
RAID
13 years 10 months ago
2001 Springer RAID
13 years 10 months ago
2001 Springer RAID
13 years 10 months ago
2001 Springer
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
RAID
13 years 10 months ago
2001 Springer
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
|