北极人 发表于 2025-3-25 07:01:43

http://reply.papertrans.cn/95/9416/941503/941503_21.png

不可救药 发表于 2025-3-25 08:10:20

An Introduction to Intrusion Detection,perspective of classical detection theory. If we wish to classify our source behavior correctly as either . or ., knowledge of both distributions of behavior will help us greatly when making the intrusion detection decision. Interestingly, early on only few research prototype took this view [Lee99,

filicide 发表于 2025-3-25 14:36:56

http://reply.papertrans.cn/95/9416/941503/941503_23.png

卡死偷电 发表于 2025-3-25 16:29:55

Visualizing Intrusions: Watching the Webserver, while counteracting the drawbacks was supported. Furthermore the anomaly based log reduction system could indeed be very simple and still successfully serve as a front end to the visualization system. The hypothesis that visualizing the structure of the requests strings themselves cut into componen

Canyon 发表于 2025-3-25 22:16:45

http://reply.papertrans.cn/95/9416/941503/941503_25.png

Engulf 发表于 2025-3-26 00:43:47

,Visualization for Intrusion Detection—Hooking the Worm,small web server. The different requests made by worms can be correlated to the particular type of worm making the requests. Furthermore, the clusters formed by worm requests are markedly different from the clusters formed by benign requests .. Other patterns of malicious requests were also found, o

follicle 发表于 2025-3-26 07:32:28

Book 2006number of research efforts performed over a period of six years or so into a coherent whole. It was my honor to serve as the "opponent" at Dr. Axelsson‘s examination. In the Swedish system, it is the job of the opponent to place the candidate‘s work into a broader perspective, demonstrating its sign

打包 发表于 2025-3-26 09:28:39

http://reply.papertrans.cn/95/9416/941503/941503_28.png

污点 发表于 2025-3-26 13:48:34

Stefan Axelsson,David SandsIntroduces the innovative idea of applying information visualization techniques to the intrusion detection problem by combining a simple anomaly-based log reduction scheme.The resulting approach appli

Pepsin 发表于 2025-3-26 16:47:08

http://reply.papertrans.cn/95/9416/941503/941503_30.png
页: 1 2 [3] 4
查看完整版本: Titlebook: Understanding Intrusion Detection through Visualization; Stefan Axelsson,David Sands Book 2006 Springer-Verlag US 2006 Protection.Webserve