Information Technology Reference
In-Depth Information
faced with the scalability problem due to the large number of partial orderings of
operations. While no improvements over worst-case complexity exist, we employ
engineering approaches such as divide and conquer and use the concept of job priori-
ties, user workspaces and meta-operations for monitoring [1]. We are currently build-
ing a prototype of the system to demonstrate the proof-of-concept.
References
1. Chinchani, R., Upadhyaya, S., and Kwiat, K.: Towards the scalable implementation of a
user level anomaly detection system. IEEE MILCOM 2002 , Anaheim, CA (October 2002)
2. Debar, H., Dacier, M., and Wespi, A.: Towards a Taxonomy of Intrusion Detection Sys-
tems. Computer Networks , 31 (1999) 805-822
3. Dening, D.: An Intrusion-Detection Model. IEEE Transactions on Software Engineering ,
Vol. SE-13, No. 2 (February 1987) 222-232
4. Upadhyaya, S. and Kwiat, K.: A distributed concurrent intrusion detection scheme based on
assertions. SCS Int. Symposium on Performance Evaluation of Computer and Telecommuni-
cation Systems , Chicago, IL (July 1999) 369-376
5. Upadhyaya S., Chinchani, R., and Kwiat, K.: An analytical framework for reasoning about
intrusions. IEEE Symposium on Reliable Distributed Systems , New Orleans, LA (October
2001) 99-108
Search WWH ::




Custom Search