Search results for "Network forensics"
showing 1 items of 1 documents
Two tiered privacy enhanced intrusion detection system architecture
2009
The paper describes an architecture for privacy-enhanced intrusion detection systems, that separates privacy-invasive and privacy-preserving operations. This can be useful in cases where less sensitive network monitoring is outsourced to a third party and more sensitive network monitoring operations and data forensics are performed in-house or by law enforcement agencies.