Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?
In recent years, researchers have focused on the ability of intrusion detection systems to resist evasion: techniques attackers use to bypass intrusion detectors and avoid detection. Researchers have developed successful evasion techniques either for network-based (e.g., [14], [191]) or host-based (...
Saved in:
Published in | Malware Detection pp. 193 - 209 |
---|---|
Main Authors | , |
Format | Book Chapter |
Language | English |
Published |
Boston, MA
Springer US
|
Series | Advances in Information Security |
Online Access | Get full text |
Cover
Loading…
Summary: | In recent years, researchers have focused on the ability of intrusion detection systems to resist evasion: techniques attackers use to bypass intrusion detectors and avoid detection. Researchers have developed successful evasion techniques either for network-based (e.g., [14], [191]) or host-based (e.g., [18],[20]) detectors. |
---|---|
ISBN: | 9780387327204 0387327207 |
ISSN: | 1568-2633 |
DOI: | 10.1007/978-0-387-44599-1_9 |