Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems

Abstract

Our work proposes a generic architecture for runtime monitoring and optimization of IDS based on the challenge insertion. The challenges, known instances of malicious or legitimate behavior, are inserted into the network traffic represented by NetFlow records, processed with the current traffic and the system’s response to the challenges is used to… (More)
DOI: 10.1007/978-3-642-04342-0_4
View Slides

Topics

12 Figures and Tables

Statistics

01020201520162017
Citations per Year

Citation Velocity: 6

Averaging 6 citations per year over the last 3 years.

Learn more about how we calculate this metric in our FAQ.

Slides referencing similar topics