Next:
Specification-based Techniques
Up:
Detecting and Countering System
Previous:
Dispatching Audit Data to
Implementation
This section presents our experience in the implementation of various intrusion detection techniques using ID wrappers.
Specification-based Techniques
Signature-based Techniques
Sequence-based Techniques
Calvin Ko
2000-06-13