NIC-based intrusion detection: A feasibility study Srinivasan Parthasarathy

Roadmap Motivation and Approaches Challenges and Objectives Preliminary Work Algorithms Experimental Results Conclusions Motivation Why NIC-based Intrusion Detection Pros Better Coverage and Scalability More security end points Better Reliability and Performance Host is separate from NIC Adaptable, Flexible and Dynamic...

Author:
Uploaded by: Murkka Svensdottir
Filesize: 456 KB