[PDF][PDF] Intrusion detection systems: A survey and taxonomy
S Axelsson - 2000 - Citeseer
This paper presents a taxonomy of intrusion detection systems that is then used to survey
and classify a number of research prototypes. The taxonomy consists of a classification first …
and classify a number of research prototypes. The taxonomy consists of a classification first …
Towards a taxonomy of intrusion-detection systems
Intrusion-detection systems aim at detecting attacks against computer systems and
networks, or against information systems in general, as it is difficult to provide provably …
networks, or against information systems in general, as it is difficult to provide provably …
Revised taxonomy for intrusion-detection systems
Intrusion-detection systems aim at detecting attacks against computer systems and
networks, or in general against information systems. Indeed, it is difficult to provide provably …
networks, or in general against information systems. Indeed, it is difficult to provide provably …
Real time monitoring and analysis of events from multiple network security devices
HS Njemanze, PS Kothari - US Patent 7,376,969, 2008 - Google Patents
30 are cross-correlated according to rules to generate meta events. The security events may
be gathered remotely from a system at which the cross-correlating is performed. Any meta …
be gathered remotely from a system at which the cross-correlating is performed. Any meta …
Intrusion detection: A survey
This chapter provides the overview of the state of the art in intrusion detection research.
Intrusion detection systems are software and/or hardware components that monitor …
Intrusion detection systems are software and/or hardware components that monitor …
Contextual information fusion for intrusion detection: a survey and taxonomy
A Aleroud, G Karabatis - Knowledge and Information Systems, 2017 - Springer
Research in cyber-security has demonstrated that dealing with cyber-attacks is by no means
an easy task. One particular limitation of existing research originates from the uncertainty of …
an easy task. One particular limitation of existing research originates from the uncertainty of …
Probabilistic alert correlation
ADJ Valdes, K Skinner - US Patent 7,917,393, 2011 - Google Patents
In preferred embodiments, intrusion detection systems for computer networks include
sensors that monitor both net work traffic and network resources. Correlation techniques are …
sensors that monitor both net work traffic and network resources. Correlation techniques are …
[PDF][PDF] Research in intrusion-detection systems: A survey
S Axelsson - 1998 - engineering.iastate.edu
There is currently need for an up-to-date and thorough survey of the research in the field of
computer and network intrusion detection. This paper presents such a survey, with a …
computer and network intrusion detection. This paper presents such a survey, with a …
Intrusion and intrusion detection
J McHugh - International Journal of Information Security, 2001 - Springer
Assurance technologies for computer security have failed to have significant impacts in the
marketplace, with the result that most of the computers connected to the internet are …
marketplace, with the result that most of the computers connected to the internet are …
Real time monitoring and analysis of events from multiple network security devices
HS Njemanze, PS Kothari - US Patent 8,056,130, 2011 - Google Patents
Security events generated by a number of network devices are gathered and normalized to
produce normalized security events in a common schema. The normalized security events …
produce normalized security events in a common schema. The normalized security events …