Cholagogue 发表于 2025-3-25 05:35:21

http://reply.papertrans.cn/83/8229/822816/822816_21.png

Halfhearted 发表于 2025-3-25 11:03:41

http://reply.papertrans.cn/83/8229/822816/822816_22.png

LAY 发表于 2025-3-25 13:38:28

Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Reportning that they model a program’s normal behavior and signal deviations from that behavior. Unfortunately, many program-based exploits of NT systems use specialized .. Anomaly detection systems cannot deal with such programs because there is no standard of “normalcy” that they deviate from..This pape

抛弃的货物 发表于 2025-3-25 16:29:19

http://reply.papertrans.cn/83/8229/822816/822816_24.png

公猪 发表于 2025-3-25 21:05:34

http://reply.papertrans.cn/83/8229/822816/822816_25.png

结束 发表于 2025-3-26 00:54:53

Intrusion Detection Using Variable-Length Audit Trail Patternsle of fixed-length patterns to represent the process model. However, variable-length patterns seem to be more naturally suited to model the process behavior, but they are also more difficult to construct. In this paper, we present a novel technique to build a table of variable-length patterns. This

Demulcent 发表于 2025-3-26 08:19:54

http://reply.papertrans.cn/83/8229/822816/822816_27.png

macular-edema 发表于 2025-3-26 11:34:42

The 1998 Lincoln Laboratory IDS Evaluationding. While this evaluation represents a significant and monumental undertaking, there are a number of unresolved issues associated with its design and execution. Some of methodologies used in the evaluation are questionable and may have biased its results. One of the problems with the evaluation is

Transfusion 发表于 2025-3-26 16:25:07

Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluationgenerated on a test bed that emulates a small government site. More than 200 instances of 58 attack types were launched against victim UNIX and Windows NT hosts. False alarm rates were low (less than 10 per day). Best detection was provided by network-based systems for old probe and old denial-of-se

步履蹒跚 发表于 2025-3-26 20:11:38

http://reply.papertrans.cn/83/8229/822816/822816_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Recent Advances in Intrusion Detection; Third International Hervé Debar,Ludovic Mé,S. Felix Wu Conference proceedings 2000 Springer-Verlag