3. Data sources
The analysis methods described in 2 apply to a data source. In any case, it is rare for the data source to be used raw by the intrusion detection system. We are therefore interested here not only in intercepting the data, but also in preparing it in such a way as to remove dependencies due to protocols or operating systems.
3.1 Network...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Data sources
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
References
- (1) - WOOD (M.), ERLINGER (M.) - Intrusion Detection Message Exchange Requirements. - IETF (22 oct. 2002). http://www.ietf.org/internet-drafts/draft-ietf-idwg-requirements-10.txt
- ...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!