2002
DOI: 10.1007/3-540-36084-0_14
|View full text |Cite
|
Sign up to set email alerts
|

Performance Adaptation in Real-Time Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
34
0

Year Published

2003
2003
2014
2014

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 51 publications
(35 citation statements)
references
References 12 publications
1
34
0
Order By: Relevance
“…Even worse, attackers may intentionally overload the monitoring system while an attack is in progress so as to evade detection. Previous research has shown that being able to handle different flows [21], [27], [28], or different parts of each flow [18], [19], in different ways can enable the system to invest its resources more effectively and significantly improve detection accuracy. PPL enables user applications to define the priority of each stream so that under overload conditions packets from low-priority streams are the first to go.…”
Section: B Prioritized Packet Lossmentioning
confidence: 99%
“…Even worse, attackers may intentionally overload the monitoring system while an attack is in progress so as to evade detection. Previous research has shown that being able to handle different flows [21], [27], [28], or different parts of each flow [18], [19], in different ways can enable the system to invest its resources more effectively and significantly improve detection accuracy. PPL enables user applications to define the priority of each stream so that under overload conditions packets from low-priority streams are the first to go.…”
Section: B Prioritized Packet Lossmentioning
confidence: 99%
“…The current trend lays an emphasis on fine-tuning the IDPS configuration to suit the environment and operating conditions where the IDPS will be deployed for better performance [259]. Some IDPSs are carefully designed to be very "lightweight" or are specially configured with high-end hardware (e.g., RealSecure with AppSwitch [180]) to cope with high-speed and high-volume traffic. Most IDPSs are statically configured without considering changes in the operational conditions.…”
Section: Dynamic Adaptationmentioning
confidence: 99%
“…More recent work has also explored precompiling a set of filters that a NIDS can then switch among depending on its workload [15,5] or upon detecting floods. To our knowledge, however, supplementing a NIDS's primary filter with an additional, quite different filter, has not been previously explored in the literature.…”
Section: Related Workmentioning
confidence: 99%