Главная
Study mode:
on
1
Intro
2
ANYCAN
3
Introduction
4
Background
5
Definitions - Network Protocols
6
Definitions - IDS
7
IDS Monitoring
8
Best Practices
9
Detection Techniques
10
Problems with KDD
11
Data Classification matters
12
The Algorithm Matters
13
Information Gain
14
Research Question
15
Contribution
Description:
Explore the efficacy of real-time intrusion detection systems in this 55-minute conference talk from ANYCon 2017. Delve into network protocols, IDS monitoring, and best practices for cybersecurity. Examine detection techniques, problems with KDD, and the importance of data classification. Learn about the role of algorithms and information gain in improving intrusion detection. Gain insights into cutting-edge research questions and contributions in the field of network security.

Measuring the Efficacy of Real Time Intrusion Detection Systems

Add to list
0:00 / 0:00