Wireless IDS systems have started to emerge in an effort to assist IT personnel in detecting malicious activities on a wireless network. The scope and complexity of the current offering of wireless IDS's vary dramatically. From homegrown wireless IDS's based on open source software to plug-ins to la
Towards scalable intrusion detection
โ Scribed by Siraj A. Shaikh; Howard Chivers; Philip Nobles; John A. Clark; Hao Chen
- Publisher
- Elsevier Science
- Year
- 2009
- Tongue
- English
- Weight
- 111 KB
- Volume
- 2009
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
โฆ Synopsis
We raise some questions that need to be addressed to overcome the scalability challenges that intrusion detection systems face. We also take this opportunity to highlight some of the recent related work and put it in context.
๐ SIMILAR VOLUMES
Network firewalls have been in existence for a relatively short time, yet during this period the demands made of them have dramatically changed. To adapt to those changes, firewalls had to migrate among different platforms and operating systems. In addition, the core technology and architecture upon