2001
DOI: 10.1007/3-540-45474-8_12
|View full text |Cite
|
Sign up to set email alerts
|

System Health and Intrusion Monitoring Using a Hierarchy of Constraints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2002
2002
2012
2012

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(18 citation statements)
references
References 5 publications
0
18
0
Order By: Relevance
“…Then it monitors the execution of the program or protocol whit respect to the defined constraints. If a behavior is deviated with these constraints, it is reported as an attack (Ko et al, 2001). …”
Section: Classification Of Intrusion Detection Systemmentioning
confidence: 99%
“…Then it monitors the execution of the program or protocol whit respect to the defined constraints. If a behavior is deviated with these constraints, it is reported as an attack (Ko et al, 2001). …”
Section: Classification Of Intrusion Detection Systemmentioning
confidence: 99%
“…The SHIM intrusion detection system [11] is one of the first specification-based IDS. It compares a specification of the behavior of an application program to the specification.…”
Section: Related Workmentioning
confidence: 99%
“…But, techniques geared towards wireline networks do not suffice in an ad hoc network due to mobility, the ease of listening to wireless transmissions, lack of fixed infrastructure, etc. [11]. For example, several detection strategies in wireline networks are based on the presence of a small number of static gateways that route and therefore monitor all traffic.…”
Section: Introductionmentioning
confidence: 99%