H Debar, M Dacier, A Wespi - Computer networks, 1999 - Elsevier
Intrusion-detection systems aim at detecting attacks against computer systems and networks, or against information systems in general, as it is difficult to provide provably …
H Debar, M Dacier, A Wespi - Annales des Telecommunications …, 2000 - research.ibm.com
Intrusion-detection systems aim at detecting attacks against computer systems and networks, or in general against information systems. Indeed, it is difficult to provide provably …
HS Njemanze, PS Kothari - US Patent 7,376,969, 2008 - Google Patents
30 are cross-correlated according to rules to generate meta events. The security events may be gathered remotely from a system at which the cross-correlating is performed. Any meta …
A Lazarevic, V Kumar, J Srivastava - Managing cyber threats: Issues …, 2005 - Springer
This chapter provides the overview of the state of the art in intrusion detection research. Intrusion detection systems are software and/or hardware components that monitor …
A Aleroud, G Karabatis - Knowledge and Information Systems, 2017 - Springer
Research in cyber-security has demonstrated that dealing with cyber-attacks is by no means an easy task. One particular limitation of existing research originates from the uncertainty of …
ADJ Valdes, K Skinner - US Patent 7,917,393, 2011 - Google Patents
In preferred embodiments, intrusion detection systems for computer networks include sensors that monitor both net work traffic and network resources. Correlation techniques are …
There is currently need for an up-to-date and thorough survey of the research in the field of computer and network intrusion detection. This paper presents such a survey, with a …
J McHugh - International Journal of Information Security, 2001 - Springer
Assurance technologies for computer security have failed to have significant impacts in the marketplace, with the result that most of the computers connected to the internet are …
HS Njemanze, PS Kothari - US Patent 8,056,130, 2011 - Google Patents
Security events generated by a number of network devices are gathered and normalized to produce normalized security events in a common schema. The normalized security events …