<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.cas.mcmaster.ca/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.cas.mcmaster.ca/index.php?action=history&amp;feed=atom&amp;title=False_Negatives</id>
		<title>False Negatives - Revision history</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.cas.mcmaster.ca/index.php?action=history&amp;feed=atom&amp;title=False_Negatives"/>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php?title=False_Negatives&amp;action=history"/>
		<updated>2026-04-07T07:15:21Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php?title=False_Negatives&amp;diff=1646&amp;oldid=prev</id>
		<title>Khalats:&amp;#32;New page: False negative is the term used to describe a network intrusion device's inability to detect true security events under certain circumstances. In other words, malicious activity is not det...</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php?title=False_Negatives&amp;diff=1646&amp;oldid=prev"/>
				<updated>2008-03-24T03:26:34Z</updated>
		
		<summary type="html">&lt;p&gt;New page: False negative is the term used to describe a network intrusion device&amp;#39;s inability to detect true security events under certain circumstances. In other words, malicious activity is not det...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;False negative is the term used to describe a network intrusion device's inability to detect true security events under certain circumstances. In other words, malicious activity is not detected and alerted. Fortunately, there are actions that can be taken to reduce the chance of false negative conditions without increasing the number of false positives. The difficulty in creating this &amp;quot;balance&amp;quot; is to create a more manageable NIDS deployment without introducing extra risk. First, however, we need to analyze how network intrusion detection systems detect these attacks so we can understand the consequences associated with our actions.&lt;/div&gt;</summary>
		<author><name>Khalats</name></author>	</entry>

	</feed>