An overview of Intrusion Detection within an Information System: The Improvment by Process Mining

نویسندگان

چکیده

Information Systems handle big amount of data within enterprises by offering the possibility to collect, treat, keep and make information avail- able. To realize these tasks, it is important secure from intrusions that can affect confidentiality, availability integrity information. Un- fortunately, with time, technologies are more used various types attacks act on create intrusion or misuses Systems. Research in detection field still looking for solutions such relevant problems. The purpose this paper present an overview existing techniques compared a new issue based process mining event logs analysis detect abnormal events occurs system. classified accordingly security policy etablished fuzzy logic build set rules, definition normal then reduce high level false alerts.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Overview of Data Mining and Anomaly Intrusion Detection System using K-Means

In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the security goal. One of the primary challenge to intrusion detection is the problem of misjudgement , misdetection and lack of real time response to the attack. Although various techniques or applications are available to protect data, loopholes exist. Thus to analyze data and to determine ...

متن کامل

Intrusion Detection System: Overview

Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM. ANN is one of the oldest systems that have been used for Intrusion Detection System (IDS), which presents supervised lea...

متن کامل

Overview of Intrusion Detection Techniques in Database

Data is one of the most valuable assets in today's world and is used in the everyday life of every person and organization. This data stores in a database in order to restore and maintain its efficiently. Since there is a database that can be exploited by SQL injection attacks, internal threats, and unknown threats, there are always concerns about the loss or alteration of data by unauthorized ...

متن کامل

An overview to Software Architecture in Intrusion Detection System

Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network. The IDS could detect and block attack-related network traffic. The network control is a complex model. Implementation of an IDS could make delay in the network. Several software-base...

متن کامل

An Adaptive Intrusion Detection System using a Data Mining Approach

Weak data dependencies in large databases coupled with poorly written web based applications are a major cause for malicious transactions. The problem of security becomes especially acute when access roles are changed among users. Also the poorly maintained data base caches are a cause for added security leaks. We propose an adaptive Intrusion detection system to keep track of the varying data ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Network and communication technologies

سال: 2022

ISSN: ['1927-0658', '1927-064X']

DOI: https://doi.org/10.5539/nct.v7n1p55