I continued to work on my report, summarizing all the relevant data found to this point. This report includes sections on the intrusion detection systems, the applications,
the exploits, and the parameterization. After completing my first version of my report, I met with Nur to address the next steps to be taken. The next steps included hypothesizing,
from the collected data, the optimal sequence length and determining the characteristics of this "optimal" sequence length, namely the false positive rate. In addition, parameterization
the normal database size is included in our next steps.
This research is sponsored by NSERC and the Canadian Distributed Mentorship Project.
/ Ending Area of Table //>
best viewed with Internet Explorer 7.0 or Mozilla Firefox 2.0