scispace - formally typeset
Open Access

IDIOT - Users Guide

TLDR
This manual gives a detailed technical description of the IDIOT intrusion detection system from the COAST Laboratory at Purdue University and is intended to help anyone who wishes to use, extend or test theIDIOT system.
Abstract
This manual gives a detailed technical description of the IDIOT intrusion detection system from the COAST Laboratory at Purdue University. It is intended to help anyone who wishes to use, extend or test the IDIOT system. Familiarity with security issues, and intrusion detection in particular, is assumed.

read more

Content maybe subject to copyright    Report

Citations
More filters

Intrusion Detection Systems: A Survey and Taxonomy

TL;DR: The taxonomy consists of a classification first of the detection principle, and second of certain operational aspects of the intrusion detection system as such, which are used predictively to survey and classify a number of research prototypes.
Proceedings ArticleDOI

An architecture for intrusion detection using autonomous agents

TL;DR: This paper reviews the architecture for a distributed intrusion detection system based on multiple independent entities working collectively, and calls these entities autonomous agents, which solves some of the problems previously mentioned.
Journal ArticleDOI

Intrusion detection using autonomous agents

TL;DR: The AAFID architecture and the existing prototype, as well as some design and implementation experiences and future research issues are described, which constitute a useful framework for the research and testing of intrusion detection algorithms and mechanisms.

Software vulnerability analysis

TL;DR: A selection of images from around the world have been collected and edited for clarity and brevity.
Journal ArticleDOI

Taxonomy and Survey of Collaborative Intrusion Detection

TL;DR: The entire framework of requirements, building blocks, and attacks as introduced is used for a comprehensive analysis of the state of the art in collaborative intrusion detection, including a detailed survey and comparison of specific CIDS approaches.
References
More filters
Journal Article

WHO Technical Report.

TL;DR: The Feather River Coordinated Resource Management Group (FR-CRM) has been restoring channel/ meadow/ floodplain systems in the Feather River watershed since 1985 and recognized the possibility of a significant change in carbon stocks in these restored meadows and valleys.
Book

Programming Perl

Larry Wall, +1 more
TL;DR: This third edition of Programming Perl has been expanded to cover version 5.6 of this maturing language, and new topics include threading, the compiler, Unicode, and other new features that have been added since the previous edition.

Classification and detection of computer intrusions

TL;DR: This document summarizes current capabilities, research and operational priorities, and plans for further studies that were established at the 2015 USGS workshop on quantitative hazard assessments of earthquake-triggered landsliding and liquefaction in the western hemisphere.

An Application of Pattern Matching in Intrusion Detection

TL;DR: A generalized model for matching intrusion signatures based on Colored Petri Nets is presented, and some of its properties are derived.
Book

Programming Languages: Concepts and Constructs

TL;DR: This chapter discusses Functional Programming in a Typed Language, which combines Functional Programming with Lists, and Object-Oriented Programming in C++, a Dialect of Lisp.