A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science technology
Active In SP
**

Posts: 740
Joined: Jan 2010
#1
23-01-2010, 01:56 AM



.pdf   A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems.pdf (Size: 285.26 KB / Downloads: 125)
Abstract
This paper describes a set of metrics that will help administrators of distributed, real-time (clustered) computer facilities to select the best intrusion detection system for their facilities. The metrics herein are the subset of our general metric set that particularly impact real-time and distributed processing issues. We discuss related works in this field, the role of intrusion detection in information assurance, some basic classes of intrusion detection systems, a general architecture of network intrusion detection systems, and the scorecard metrics and their application to real-time and distributed processing systems. Finally we discuss the lessons we learned using a preliminary version of the metric scorecard to test three commercial intrusion detection systems and the opportunities for further work in this area.

Authors: G. A. Fink, B. L. Chappell, T. G. Turner, and K. F. Oâ„¢Donoghue; Information Transfer
Technology Group, Code B35, Naval Surface Warfare Center, Dahlgren Division
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DETECTION OF WORMHOLE ATTACK IN MANET seminar ideas 5 1,400 26-08-2015, 12:37 AM
Last Post: Leenas
  Cut Detection in Wireless Sensor Networks pdf project girl 2 1,272 16-07-2015, 09:21 PM
Last Post: Guest
  Face Recognition-based Lecture Attendance System seminar tips 1 1,149 27-05-2015, 01:02 AM
Last Post: Guest
  Load Rebalancing for Distributed File Systems in Clouds seminar tips 3 1,805 13-04-2015, 05:21 PM
Last Post: shilpavpius
  mobile phone based attendance tracking system ppt jaseelati 0 331 30-01-2015, 01:57 PM
Last Post: jaseelati
  analysis on credit card fraud detection methods ppt jaseelati 0 154 22-01-2015, 02:45 PM
Last Post: jaseelati
  web based claim processing system pdf jaseelati 0 380 10-01-2015, 02:34 PM
Last Post: jaseelati
  credit card fraud detection using hidden markov model project download jaseelati 0 298 10-01-2015, 01:34 PM
Last Post: jaseelati
  analysis on credit card fraud detection methods ppt jaseelati 0 148 09-01-2015, 02:41 PM
Last Post: jaseelati
  credit card fraud detection ppt jaseelati 0 197 27-12-2014, 01:11 PM
Last Post: jaseelati