CCS2011: Enemy of the Good: Difference between revisions
No edit summary |
No edit summary |
||
Line 6: | Line 6: | ||
=Introduction= | =Introduction= | ||
=Intrusion Detection Requirements= | |||
=Machine Learning Requirements= | =Machine Learning Requirements= | ||
Line 16: | Line 19: | ||
=The False Alarm Problem= | =The False Alarm Problem= | ||
(need better title) | |||
Mohamed's section | Mohamed's section |
Revision as of 12:52, 21 March 2011
Title
The Enemy of the Good: Re-evaluating Research Directions in Intrusion Detection
Abstract
Introduction
Intrusion Detection Requirements
Machine Learning Requirements
Colin's section
Characteristics of IDS Data
Luc's section
The False Alarm Problem
(need better title)
Mohamed's section
Other Critiques of IDS
Discuss past work on criticizing IDS research