Difference between revisions of "CCS2011: Enemy of the Good"
Jump to navigation
Jump to search
Line 6: | Line 6: | ||
=Introduction= | =Introduction= | ||
=Intrusion Detection Requirements= | |||
=Machine Learning Requirements= | =Machine Learning Requirements= | ||
Line 16: | Line 19: | ||
=The False Alarm Problem= | =The False Alarm Problem= | ||
(need better title) | |||
Mohamed's section | Mohamed's section |
Revision as of 08:52, 21 March 2011
Title
The Enemy of the Good: Re-evaluating Research Directions in Intrusion Detection
Abstract
Introduction
Intrusion Detection Requirements
Machine Learning Requirements
Colin's section
Characteristics of IDS Data
Luc's section
The False Alarm Problem
(need better title)
Mohamed's section
Other Critiques of IDS
Discuss past work on criticizing IDS research