作者: Xiaolan Zhang , Leendert van Doorn , Trent Jaeger , Ronald Perez , Reiner Sailer
关键词:
摘要: The goal of an intrusion detection system (IDS) is to recognize attacks such that their exploitation can be prevented. Since computer systems are complex, there a variety places where possible. For example, analysis network traffic may indicate attack in progress [11], compromised daemon detected by its abnormal behavior [14, 12, 5, 10, 15], and subsequent prevented the backdoors stepping stones [16, 17].