Jackson et al., 1999 - Google Patents
Intrusion detection system (IDS) product surveyJackson et al., 1999
View PDF- Document ID
- 17955451092308441997
- Author
- Jackson K
- et al.
- Publication year
- Publication venue
- Los Alamos National Laboratory
External Links
Snippet
This survey is intended to be a comprehensive compilation and categorization of currently available intrusion detection system (IDS) commercial products. It was undertaken at the instigation and with the support of the Global Security Analysis Laboratory at IBM's Zurich …
- 238000001514 detection method 0 title abstract description 49
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jackson | Intrusion detection system (IDS) product survey | |
US7134141B2 (en) | System and method for host and network based intrusion detection and response | |
US7007301B2 (en) | Computer architecture for an intrusion detection system | |
Zamboni | Using internal sensors for computer intrusion detection | |
US8230507B1 (en) | Modular agent for network security intrusion detection system | |
US8176527B1 (en) | Correlation engine with support for time-based rules | |
US7219239B1 (en) | Method for batching events for transmission by software agent | |
Sobh | Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art | |
US7650638B1 (en) | Network security monitoring system employing bi-directional communication | |
US20070192867A1 (en) | Security appliances | |
US8056130B1 (en) | Real time monitoring and analysis of events from multiple network security devices | |
US20030188189A1 (en) | Multi-level and multi-platform intrusion detection and response system | |
US20020078382A1 (en) | Scalable system for monitoring network system and components and methodology therefore | |
US20040193943A1 (en) | Multiparameter network fault detection system using probabilistic and aggregation analysis | |
WO2003051018A1 (en) | Detecting intrusions in a network | |
CN116827675A (en) | Network information security analysis system | |
Safford et al. | The TAMU security package: An ongoing response to internet intruders in an academic environment | |
Terplan | Intranet performance management | |
Allan | Intrusion Detection Systems (IDSs): Perspective | |
LaPadula | State of the art in anomaly detection and reaction | |
CN119051977B (en) | Safety arrangement, control and automatic treatment method for multiple equipment types | |
Sterneling | Monitoring of a Modelled Real-Time System: with Data Diode Enabled Unidirectional Network | |
Shihab | IMPLEMENTATION OF INTRUSION DETECTION SYSTEM (IDS) IN NETWORK SECURITY SYSTEMS | |
Singhal | Intrusion detection systems | |
Lin | Log Analysis |