Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems.
Martin RehákEugen StaabVolker FusenigMichal PechoucekMartin GrillJan StiborekKarel BartosThomas EngelPublished in: RAID (2009)
Keyphrases
- intrusion detection system
- dynamic reconfiguration
- intrusion detection
- network security
- anomaly detection
- computer networks
- network traffic
- computer security
- distributed intrusion detection
- application specific
- monitoring system
- software systems
- network intrusion detection
- computer systems
- real time
- cyber security
- network intrusion detection systems
- software architecture
- data mining techniques
- attack detection
- intrusion prevention
- security architecture
- data mining
- alert correlation
- network intrusion
- general purpose
- malicious activities
- normal behavior
- dos attacks
- quality of service