Extracting attack manifestations to determine log data requirements for intrusion detection
Paper in proceeding, 2004
log data
intrusion detection
attack manifestations
data collection
Author
Emilie Lundin Barse
Chalmers, Department of Computer Engineering, Computer Security
Erland Jonsson
Chalmers, Department of Computer Engineering, Computer Security
20th Annual Computer Security Applications Conference (ACSAC 2004)
Subject Categories
Computer and Information Science