Information Technology Reference
In-Depth Information
faced with the scalability problem due to the large number of partial orderings of
operations. While no improvements over worst-case complexity exist, we employ
engineering approaches such as divide and conquer and use the concept of job priori-
ties, user workspaces and meta-operations for monitoring [1]. We are currently build-
ing a prototype of the system to demonstrate the proof-of-concept.
References
1. Chinchani, R., Upadhyaya, S., and Kwiat, K.: Towards the scalable implementation of a
user level anomaly detection system.
IEEE MILCOM 2002
, Anaheim, CA (October 2002)
2. Debar, H., Dacier, M., and Wespi, A.: Towards a Taxonomy of Intrusion Detection Sys-
tems.
Computer Networks
, 31 (1999) 805-822
3. Dening, D.: An Intrusion-Detection Model.
IEEE Transactions on Software Engineering
,
Vol. SE-13, No. 2 (February 1987) 222-232
4. Upadhyaya, S. and Kwiat, K.: A distributed concurrent intrusion detection scheme based on
assertions.
SCS Int. Symposium on Performance Evaluation of Computer and Telecommuni-
cation Systems
, Chicago, IL (July 1999) 369-376
5. Upadhyaya S., Chinchani, R., and Kwiat, K.: An analytical framework for reasoning about
intrusions.
IEEE Symposium on Reliable Distributed Systems
, New Orleans, LA (October
2001) 99-108