this approach is what're called "anomaly detection" as opposed to "misuse detection" in intrusion detection systems. i taught a graduate course this fall which reviewed the state of the art in IDSs as well as touching on security evaluation/review. There's an extensive reading list. the course web page is still up; you may find the papers interesting. See: http://philby.ucsd.edu/~cse291_IDVA/ -------- Bennet S. Yee Phone: +1 858 534 4614 Email: bsyat_private (i often don't capitalize due to tendonitis) Web: http://www-cse.ucsd.edu/~bsy/ USPS: Dept of Comp Sci and Eng, 0114, UC San Diego, La Jolla, CA 92093-0114 --------------------------------------------------------------------- To unsubscribe, e-mail: loganalysis-unsubscribeat_private For additional commands, e-mail: loganalysis-helpat_private
This archive was generated by hypermail 2b30 : Fri Dec 21 2001 - 13:57:05 PST