Monitoring, Fusion, and Response for Cyber Resilience
biblio
Submitted by awhitesell on Mon, 10/15/2018 - 1:34pm
tearline
Submitted by awhitesell on Tue, 10/09/2018 - 2:50pm
tearline
Submitted by awhitesell on Tue, 10/09/2018 - 1:48pm
biblio
Submitted by awhitesell on Fri, 07/13/2018 - 2:46pm
biblio
Submitted by awhitesell on Fri, 07/13/2018 - 2:37pm
tearline
Submitted by David Nicol on Mon, 03/19/2018 - 10:24pm
group_project
Submitted by David Nicol on Mon, 03/19/2018 - 10:02pm
We believe that diversity and redundancy can help us prevent an attacker from hiding all of his or her traces. Therefore, we will strategically deploy diverse security monitors and build a set of techniques to combine information originating at the monitors. We have shown that we can formulate monitor deployment as a constrained optimization problem wherein the objective function is the utility of monitors in detecting intrusions.