Exploiting independent state for network intrusion detection
Network intrusion detection systems (NIDSs) critically rely on processing a great deal of state. Often much of this state resides solely in the volatile processor memory accessible to a single user-level process on a single machine. In this work, we highlight the power of independent state, i.e., in...
Saved in:
Published in | 21st Annual Computer Security Applications Conference (ACSAC'05) pp. 13 pp. - 71 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
2005
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!