To aid system administrators with post-attack intrusion analysis, the Kerf toolkit provides an integrated front end and powerful correlation and data-representation tools, all in one package.
Kerf toolkit, network-based intrusions, security, system administrators, post-attack intrusion analysis, integrated front end, correlation tools, data-representation tools
Intrusion detection systems (Computer security)
Computer Sciences | Digital Communications and Networking
Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.
Aslam, Javed A.; Bratus, Sergey; Kotz, David; Peterson, Ron; Tofel, Brett; and Rus, Daniela, "The Kerf toolkit for intrusion analysis" (2004). Computer and Information Science Faculty Publications. Paper 6. http://hdl.handle.net/2047/d20000321
Click button above to open, or right-click to save.COinS