作者: Ursula Schwuttke , Robert Angelino
DOI:
关键词:
摘要: A network intrusion detection system using both probabilistic analysis and aggregation analysis. The is run within a system, includes first set of firewall rules, second third authentication rules which authenticates the user, VPN, host intrusion. special correlation rule correlates among other in order to determine information from patterns. look at also patterns data, attempting find where intrusions may exist prior their actual occurance.