An Eye on Network Intruder-Administrator Shootouts

  • Luc Girardin
  • Published 1999 in
    Workshop on Intrusion Detection and Network…


Carefully logging network activity is essential to meet the requirements of high security and optimal resource availability. However, detecting break-in attempts within this activity is a difficult task. Making the distinction between misuse and normal use is hard, and identifying intrusions that use novel attacks is fundamentally difficult. In this paper… (More)


4 Figures and Tables


Citations per Year

79 Citations

Semantic Scholar estimates that this publication has 79 citations based on the available data.

See our FAQ for additional information.

Slides referencing similar topics