Exploiting independent state for network intrusion detection

Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessible to a single user-level process on a single machine. In this work, we highlight the power of independent state, i.e., in...

Full description

Saved in:
Bibliographic Details
Published in21st Annual Computer Security Applications Conference (ACSAC'05) pp. 13 pp. - 71
Main Authors Sommer, R., Paxson, V.
Format Conference Proceeding
LanguageEnglish
Published IEEE 2005
Subjects
Online AccessGet full text

Cover

Loading…