increasing costs require comprehensive methodologies for provisioning cost-effective
distributed intrusion detection systems. This paper introduces a novel framework for
designing resilient distributed intrusion detection systems. The framework leverages the
output of a risk assessment methodology to identify and rank critical communications flows.
These flows are integrated in an optimization problem that minimizes the number of …