CCS2011: Enemy of the Good: Difference between revisions
No edit summary |
|||
Line 33: | Line 33: | ||
=Discussion= | =Discussion= | ||
synthetic versus real data issue | |||
attack distribution issue | |||
=Conclusion= | =Conclusion= | ||
=References= | =References= |
Revision as of 13:07, 21 March 2011
Title
The Enemy of the Good: Re-evaluating Research Directions in Intrusion Detection
Abstract
Introduction
Intrusion Detection Requirements
Machine Learning Requirements
Colin's section
Characteristics of IDS Data
Luc's section
The False Alarm Problem
(need better title)
Mohamed's section
Other Critiques of IDS
Discuss past work on criticizing IDS research
Potential Solutions
Discussion
synthetic versus real data issue attack distribution issue