Attack detection vs privacy --- how to find the link or how to hide it (transcript of discussion)

2011 
Alf Zugenmaier: What exactly does the IDS try to detect, what kind of intrusions? Ji$#345;i Kůr: The IDS tries to detect the malicious nodes and the malicious activity of these nodes. Mike Burmester: So anomalous behaviour? Ji$#345;i Kůr: Yes, in principle. The particular examples may be packet dropping, packet injection, packet modification, jamming, and so on. Alf Zugenmaier: Do you have a list of that coming up, because these are so various examples. How far do you want to push the IDS, what it is supposed to detect and what it is not supposed to detect?
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []