The behavior and nature of attacks and threats to computer network systems have been evolving rapidly with the ad-vances in computer security technology. At the same time however, computer criminals and other malicious elements find ways and methods to thwart such protective measures and find techniques of penetrating such secure systems. Therefore adaptability, or the ability to learn and react to a consistently changing threat environment, is a key require-ment for modern intrusion detection systems. In this paper we try to develop a novel metric to assess the performance of such intrusion detection systems under the influence of attacks. We propose a new metric called feedback reliability ratio for an intrusion detection system. We furth...
Abstract: Large Critical Complex Infrastructures are increasingly dependent on IP networks. Reliabil...
In computer systems and computer networks, security is a research area in constant evolution. Ever s...
Abstract—This contribution presents a graph based approach for modelling the effects of both attacks...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
A fundamental problem in intrusion detection is what met-ric(s) can be used to objectively evaluate ...
Network intrusions compromise the network’s confidentiality, integrity and availability of resources...
Part 5: Metrics and Risk AssessmentInternational audienceNowadays intrusion detection system (IDS) h...
While intrusion detection systems are becoming ubiquitous defenses in today's networks, current...
Network-based Intrusion Detection Systems (NIDSs) are an important mechanism to identify malicious b...
This paper describes a set of metrics that will help administrators of distributed, real-time (clust...
The performance of different anomaly detection algorithms is typically compared using metrics that d...
Abstract- Host intrusion detection systems (HIDSs) are important tools used to provide security to c...
This paper is based on a conceptual framework in which security can be split into two generic types ...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
When large numbers of alerts are reported by intrusion detection (ID) systems in very fine granulari...
Abstract: Large Critical Complex Infrastructures are increasingly dependent on IP networks. Reliabil...
In computer systems and computer networks, security is a research area in constant evolution. Ever s...
Abstract—This contribution presents a graph based approach for modelling the effects of both attacks...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
A fundamental problem in intrusion detection is what met-ric(s) can be used to objectively evaluate ...
Network intrusions compromise the network’s confidentiality, integrity and availability of resources...
Part 5: Metrics and Risk AssessmentInternational audienceNowadays intrusion detection system (IDS) h...
While intrusion detection systems are becoming ubiquitous defenses in today's networks, current...
Network-based Intrusion Detection Systems (NIDSs) are an important mechanism to identify malicious b...
This paper describes a set of metrics that will help administrators of distributed, real-time (clust...
The performance of different anomaly detection algorithms is typically compared using metrics that d...
Abstract- Host intrusion detection systems (HIDSs) are important tools used to provide security to c...
This paper is based on a conceptual framework in which security can be split into two generic types ...
A fundamental problem in intrusion detection is what metric(s) can be used to objectively evaluate a...
When large numbers of alerts are reported by intrusion detection (ID) systems in very fine granulari...
Abstract: Large Critical Complex Infrastructures are increasingly dependent on IP networks. Reliabil...
In computer systems and computer networks, security is a research area in constant evolution. Ever s...
Abstract—This contribution presents a graph based approach for modelling the effects of both attacks...