Key points are not available for this paper at this time.
Network-based attacks have become common and sophisticated. For this reason, intrusion detection systems are now shifting their focus from the hosts and their operating systems to the network itself. Network-based intrusion detection is challenging because network auditing produces large amounts of data, and different events related to a single intrusion may be visible in different places on the network. This paper presents NetSTAT, a new approach to network intrusion detection. By using a formal model of both the network and the attacks, NetSTAT is able to determine which network events have to be monitored and where they can be monitored.
Building similarity graph...
Analyzing shared references across papers
Loading...
Vigna et al. (Wed,) studied this question.
www.synapsesocial.com/papers/6a09b98f0e219f8cdd343cd0 — DOI: https://doi.org/10.1109/csac.1998.738566
Synapse has enriched 5 closely related papers on similar clinical questions. Consider them for comparative context:
Giovanni Vigna
Richard A. Kemmerer
University of California, Santa Barbara
Reliable Software Resources (United States)
Building similarity graph...
Analyzing shared references across papers
Loading...