Check out the new USENIX Web site. next up previous
Next: Specification-based Techniques Up: Detecting and Countering System Previous: Dispatching Audit Data to

Implementation

This section presents our experience in the implementation of various intrusion detection techniques using ID wrappers.

 

Calvin Ko
2000-06-13