Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?

In recent years, researchers have focused on the ability of intrusion detection systems to resist evasion: techniques attackers use to bypass intrusion detectors and avoid detection. Researchers have developed successful evasion techniques either for network-based (e.g., [14], [191]) or host-based (...

Full description

Saved in:
Bibliographic Details
Published inMalware Detection pp. 193 - 209
Main Authors Christodorescu, Mihai, Rubin, Shai
Format Book Chapter
LanguageEnglish
Published Boston, MA Springer US
SeriesAdvances in Information Security
Online AccessGet full text

Cover

Loading…
More Information
Summary:In recent years, researchers have focused on the ability of intrusion detection systems to resist evasion: techniques attackers use to bypass intrusion detectors and avoid detection. Researchers have developed successful evasion techniques either for network-based (e.g., [14], [191]) or host-based (e.g., [18],[20]) detectors.
ISBN:9780387327204
0387327207
ISSN:1568-2633
DOI:10.1007/978-0-387-44599-1_9