Abstract

To aid system administrators with post-attack intrusion analysis, the Kerf toolkit provides an integrated front end and powerful correlation and data-representation tools, all in one package.

Notes

Originally published in IEEE Security & Privacy, vol. 2, no. 6 (Nov.-Dec. 2004), pp. 42-52.

Keywords

Kerf toolkit, network-based intrusions, security, system administrators, post-attack intrusion analysis, integrated front end, correlation tools, data-representation tools

Subject Categories

Intrusion detection systems (Computer security)

Disciplines

Computer Sciences | Digital Communications and Networking

Publication Date

11-2004

Rights Information

Copyright 2004

Restrictions

Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.

Rights Holder

IEEE

Click button above to open, or right-click to save.

Share

COinS