Abstract
Alf Zugenmaier: What exactly does the IDS try to detect, what kind of intrusions?
Jiří Kůr: The IDS tries to detect the malicious nodes and the malicious activity of these nodes.
Mike Burmester: So anomalous behaviour?
Jiří Kůr: Yes, in principle. The particular examples may be packet dropping, packet injection, packet modification, jamming, and so on.
Alf Zugenmaier: Do you have a list of that coming up, because these are so various examples. How far do you want to push the IDS, what it is supposed to detect and what it is not supposed to detect?
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kůr, J., Stetsko, A. (2011). Attack Detection vs Privacy – How to Find the Link or How to Hide It (Transcript of Discussion). In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds) Security Protocols XIX. Security Protocols 2011. Lecture Notes in Computer Science, vol 7114. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25867-1_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-25867-1_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25866-4
Online ISBN: 978-3-642-25867-1
eBook Packages: Computer ScienceComputer Science (R0)