Using Vulnerability Information and Attack Graphs for Intrusion Detection

Download Now
Provided by: Hasso-Plattner-Institut
Topic: Security
Format: PDF
Intrusion Detection Systems (IDS) have been used widely to detect malicious behavior in network communication and hosts. IDS management is an important capability for distributed IDS solutions, which makes it possible to integrate and handle different types of sensors or collect and synthesize alerts generated from multiple hosts located in the distributed environment. Sophisticated attacks are difficult to detect and make it necessary to integrate multiple data sources for detection and correlation. Attack Graph (AG) is used as an effective method to model, analyze, and evaluate the security of complicated computer systems or networks.
Download Now

Find By Topic