Evaluating a Real-time Anomaly-based IDS

12/1/98


Click here to start


Table of Contents

Evaluating a Real-time Anomaly-based IDS

Anomaly-based Intrusion Detection

A Real-time Anomaly-based IDS

Behavioral profiles

Evaluation

Preliminary Evaluation results

Lessons

Conclusions

Author: tobias