Continuous Time Bayesian Network Approach for Intrusion Detection



FREE-DOWNLOAD J Xu – 2010
. The sooner the alert triggers, the less the scope of the destruction is. In the detection phase, the .
anomalies at different aggregation levels. Kruegel et al. . 15 Page 30. 2.2.2 HIDS Previous work
on detecting intrusions in system call logs can be roughly grouped into two .