117
click to vote
RAID
15 years 6 months ago
2001 Springer
Abstract. This paper describes an aggregation and correlation algorithm used in the design and implementation of an intrusion-detection console built on top of the Tivoli Enterpris...
RAID
15 years 6 months ago
2001 Springer RAID
15 years 6 months ago
2001 Springer 123
click to vote
RAID
15 years 6 months ago
2001 Springer
With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
118
click to vote
RAID
15 years 6 months ago
2001 Springer
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
|