What did we come up with?
|
Our concept was for data to be fed into an RDBMS system, where it would
be searchable via SQL select statements. We didn't know what to expect,
however, in terms of database performance under this sort of data.
Therefore, we decided to try several different approaches, and compare
their performance against eachother, as well as comparing their
performance against the performace of a real-world IDS package. We chose
to use the IDIOT intrusion detection system, as it was readily available
here at Purdue, and worked on Sparc Solaris machines wih the BSM audit
logging facility.
|
|
|