CCS2011: Enemy of the Good: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
=Title= | =Title= | ||
Line 7: | Line 6: | ||
=Introduction= | =Introduction= | ||
=Machine Learning Requirements= | |||
=Characteristics of IDS Data= | |||
=The False Alarm Problem= | |||
=Other Critiques of IDS= | |||
Discuss past work on criticizing IDS research | |||
=Potential Solutions= | |||
=Discussion= | =Discussion= | ||
=Conclusion= | =Conclusion= | ||
=References= | =References= |
Revision as of 12:47, 21 March 2011
Title
The Enemy of the Good: Re-evaluating Research Directions in Intrusion Detection
Abstract
Introduction
Machine Learning Requirements
Characteristics of IDS Data
The False Alarm Problem
Other Critiques of IDS
Discuss past work on criticizing IDS research