A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Optimal thresholds for intrusion detection systems
2016
Proceedings of the Symposium and Bootcamp on the Science of Security - HotSos '16
In recent years, we have seen a number of successful attacks against high-profile targets, some of which have even caused severe physical damage. These examples have shown us that resourceful and determined attackers can penetrate virtually any system, even those that are secured by the "air-gap." Consequently, in order to minimize the impact of stealthy attacks, defenders have to focus not only on strengthening the first lines of defense but also on deploying effective intrusiondetection
doi:10.1145/2898375.2898399
dblp:conf/hotsos/LaszkaASVK16
fatcat:5cqob3crjzh4zez3bipoaqdq2u