Publication Details
Title: Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context
Author: H. Dreger, C. Kreibich, V. Paxson, and R. Sommer
Group: Networking
Date: July 2005
PDF: http://www.icsi.berkeley.edu/pubs/networking/enhancingaccuracy05.pdf
Acknowledgements:
This work was partially supported by funding provided to ICSI through National Science Foundation grant OCI: 0334088 (“Viable Network Defense for Scientific Research Institutions”). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors or originators and do not necessarily reflect the views of the National Science Foundation.
Bibliographic Information:
Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005), Vienna, Austria, pp. 206-221
Bibliographic Reference:
H. Dreger, C. Kreibich, V. Paxson, and R. Sommer. Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005), Vienna, Austria, pp. 206-221, July 2005
Author: H. Dreger, C. Kreibich, V. Paxson, and R. Sommer
Group: Networking
Date: July 2005
PDF: http://www.icsi.berkeley.edu/pubs/networking/enhancingaccuracy05.pdf
Acknowledgements:
This work was partially supported by funding provided to ICSI through National Science Foundation grant OCI: 0334088 (“Viable Network Defense for Scientific Research Institutions”). Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors or originators and do not necessarily reflect the views of the National Science Foundation.
Bibliographic Information:
Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005), Vienna, Austria, pp. 206-221
Bibliographic Reference:
H. Dreger, C. Kreibich, V. Paxson, and R. Sommer. Enhancing the Accuracy of Network-Based Intrusion Detection with Host-Based Context. Proceedings of Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005), Vienna, Austria, pp. 206-221, July 2005
