Evaluating a Real-time Anomaly-based IDS

Anomaly-based Intrusion Detection

A Real-time Anomaly-based IDS

Behavioral profiles

Evaluation

Preliminary Evaluation results

Lessons

Conclusions