نتایج جستجو برای: misuse detection

تعداد نتایج: 574962  

Journal: :Steroids 2011
Andreu Fabregat Oscar J Pozo Josep Marcos Jordi Segura Rosa Ventura

The screening of testosterone misuse in the doping control field is normally performed by the measurement of the ratio between the concentrations of testosterone and epitestosterone excreted as glucuronides (T/E). Despite the satisfactory results obtained with this approach, the measurement of T/E presents some limitations like the long-term detection of oral testosterone administration. Recent...

2000
Susan M. Bridges Rayford B. Vaughn

We are developing a prototype intelligent intrusion detection system (IIDS) to demonstrate the effectiveness of data mining techniques that utilize fuzzy logic and genetic algorithms. This system combines both anomaly based intrusion detection using fuzzy data mining techniques and misuse detection using traditional rule-based expert system techniques. The anomaly-based components are developed...

2012
Fatemeh Ziaeetabar Nasrollah Moghadam Charkari

Video surveillance technology is one of the most important topics in the security technology domain. However, the existing video surveillance systems relay on human observers and have some limitations. Therefore, it is necessary these systems equipped to an internal intelligence and detect abnormality automatically. In this paper, we have proposed a novel method for recognizing abnormal behavio...

2013
Ravneet Kaur

Wireless mesh networks are very common both for organizations and individuals. Many laptops, computers have wireless cards pre-installed for buyer. However a wireless networking has many security issues. An intrusions detection system aim to detect the different attacks against network and system. An intrusion detection system should be capable for detecting the misuse of the network whether it...

2012
George Magklaras

An Insider Misuse Threat Detection and Prediction Language Georgios Vasilios Magklaras BSc (Hons) MPhil Numerous studies indicate that amongst the various types of security threats, the problem of insider misuse of IT systems can have serious consequences for the health of computing infrastructures. Although incidents of external origin are also dangerous, the insider IT misuse problem is diffi...

2009
T. Subbulakshmi A. Ramamoorthi Mercy Shalinie

Intrusion Detection problem is one of the most promising research issues of Information Security. The problem provides excellent opportunities in terms of providing host and network security. Intrusion detection is divided into two categories with respect to the type of detection. Misuse detection and Anomaly detection. Intrusion detection is done using rule based, Statistical, and Soft computi...

2008
G. B. Magklaras

The majority of computer security methods tend to focus upon the detection and prevention of security incidents of external origin. However, a number of surveys and media reports indicate the dangers of legitimate user misuse of IT resources, a separate category of computer security incidents with serious consequences for the integrity, privacy and availability of computer systems and networks....

2004
A. H. Phyo S. M. Furnell

Although the problem of insider misuse of IT systems is frequently recognised in the results of computer security surveys, it is less widely accounted for in organisational security practices and available countermeasures. Indeed, the opportunities for insider misuse, by perpetrators with legitimately assigned privileges, are often overlooked until an incident occurs. A possible reason for this...

2012
Sule Simsek

Intrusion detection systems (IDS)are crucial components of the security mechanisms of today’s computer systems. Existing research on intrusion detection has focused on sequential intrusions. However, intrusions can also be formed by concurrent interactions of multiple processes. Some of the intrusions caused by these interactions cannot be detected using sequential intrusion detection methods. ...

2005
Dhanant Subhadrabandhu Saswati Sarkar Farooq Anjum

We focus on detecting intrusions in wireless ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also generate false positives. Combining theories of hypothesis testing and approximation algorithms, we develop a framework to counter different threats while minimizing the resource consumption. We obtain computationally...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید