• No se han encontrado resultados

A framework for implementing a Distributed Intrusion Detection System (DIDS) with interoperabilty and information analysis

N/A
N/A
Protected

Academic year: 2017

Share "A framework for implementing a Distributed Intrusion Detection System (DIDS) with interoperabilty and information analysis"

Copied!
10
0
0

Texto completo

Loading

Figure

Fig. 1. Example IDMEF alert.
Fig. 2. Alert processing pipeline.
Fig. 3. System Architecture.

Referencias

Documento similar

No obstante, como esta enfermedad afecta a cada persona de manera diferente, no todas las opciones de cuidado y tratamiento pueden ser apropiadas para cada individuo.. La forma

 The expansionary monetary policy measures have had a negative impact on net interest margins both via the reduction in interest rates and –less powerfully- the flattening of the

Implementation of the ELISA magnetic immunoassay for atrazine detection by using a microfluidic chip with BDD Pt-NPs electrode as detection platform.. Implementation of the

 using series of many (dozens) of images, in the search of unknown objects moving in any direction and with any proper motion. Track

In parallel to the use of aircraft spotters, we have an automatic aircraft detection system developed at UCSD known as TBAD (Transponder-Based Aircraft Detection).. Our airspace is

While the focus of person detection ap- proaches is to obtain a high detection performance and to reduce false positive detections, we aim at determining the areas without people in

BASE SHADOW DETECTION ALGORITHM The shadow detection algorithm described in [4] (from now on base algorithm) is based on the application of two independent shadow detectors

This observation, together with the fact that several combina- tions of antibodies that worked well in ELISA were less efficient for detection in LFIA, led us to hypothesize that