License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/DagSemProc.08102.5
URN: urn:nbn:de:0030-drops-14962
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2008/1496/
Go to the corresponding Portal |
Braun, Lothar ;
Braun, Thorsten ;
Carle, Georg ;
Dressler, Falko ;
Feldmann, Anja ;
Haage, Dirk ;
Limmer, Tobias ;
Zseby, Tanja
5. 08102 Working Group -- Measurement Requirements
Abstract
The objective of this working group was to derive measurement requirements and challenges that originate from intrusion detection.
BibTeX - Entry
@InProceedings{braun_et_al:DagSemProc.08102.5,
author = {Braun, Lothar and Braun, Thorsten and Carle, Georg and Dressler, Falko and Feldmann, Anja and Haage, Dirk and Limmer, Tobias and Zseby, Tanja},
title = {{5. 08102 Working Group – Measurement Requirements}},
booktitle = {Perspectives Workshop: Network Attack Detection and Defense},
pages = {1--4},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2008},
volume = {8102},
editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/opus/volltexte/2008/1496},
URN = {urn:nbn:de:0030-drops-14962},
doi = {10.4230/DagSemProc.08102.5},
annote = {Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation}
}
Keywords: |
|
Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma |
Freie Schlagwörter (deutsch): |
|
network monitoring, flow analysis, denial of service detection and response, event correlation |
Collection: |
|
08102 - Perspectives Workshop: Network Attack Detection and Defense |
Issue Date: |
|
2008 |
Date of publication: |
|
20.05.2008 |