Content Filtering for Network Intrusion Detection


    Network intrusion detection technologies depend upon techniques for processing large amounts of data efficiently. The first stage is a filter that selects relevant data from the environment. The selected data are then further analyzed in subsequent stages to reveal correlated anomalies indicative of possible intrusions, ultimately resulting in a decision as… (More)


    Figures and Tables

    Sorry, we couldn't extract any figures or tables for this paper.

    Slides referencing similar topics