22 research outputs found

    Races to Modernity: Metropolitan Aspirations in Eastern Europe, 1890–1940. An Introduction

    No full text
    status: publishe

    4. 8102 Working Group -- Attack Taxonomy

    No full text
    The starting point of this working group was the question about the kinds of attacks that can be detected by inspecting in network traffic. In general, we identified four major problems that network-based intrusion detection systems are facing: 1. Encrypted network traffic 2. Application-level attacks 3. Performance 4. Evasion attack

    6. 08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective

    No full text
    Detection of malicious traffic is based on its input data, the information that is co-ming from network-based monitoring systems. Best detection rates would only be possible by monitoring all data transferred over all network lines in a distributed net-work. Monitoring and reporting this amount of data are feasible in neither today\u27s, nor will be in future\u27s systems. Later analysis like stateful inspection of the traffic imposes even more processing costs. But only at this level of monitoring and analysis there may be a chance to capture all attacks inside a system. So there needs to be a trade-off between detection success and the processing costs
    corecore