نتایج جستجو برای: misuse detection

تعداد نتایج: 574962  

2010
Liberios VOKOROKOS Anton BALÁŽ Branislav MADOŠ

In this paper we discuss our research in developing intrusion detection software framework for modeling, simulation and detection computer system intrusion based on partially ordered events and patterns FEIIDS. The article describes problematic of intrusion detection systems and intrusions detection. We provide concrete design of developed framework based on intrusion signatures threats are mat...

2011
Munish Sharma

In a wireless network system the security is a main concern for a user. It is basically suffering from mainly two security attacks i) Virus Attack ii) Intruders. Intruder does not only mean it want to hack the private information over the network, it also includes using a node bandwidth and increasing the Delay of Service for other host over the network. This paper is basically based on such ty...

Journal: :Adv. Internet of Things 2011
Ravneet Kaur

A wireless network is not as secure as compare the wired network because the data is transferred on air so any intruder can use hacking techniques to access that data. Indeed it is difficult to protect the data and provide the user a secure information system for lifetime. An intrusions detection system aim to detect the different attacks against network and system. An intrusion detection syste...

Journal: :Journal of applied physiology 2008
Carsten Lundby Niels J Achman-Andersen Jonas J Thomsen Anne M Norgaard Paul Robach

BACKGROUND the main action of recombinant human erythropoietin (rHuEpo) is to increase the oxygen carrying capacity of the blood. To prevent a possible misuse of rHuEpo, this is tested in urine samples collected from athletes by World Anti-Doping Agency (WADA)-accredited laboratories. Recently the test has met serious critiques, and the aims of the present study were to investigate the detectio...

Journal: :Journal of Computer Security 1999
Thomas E. Daniels Eugene H. Spafford

Conventional host-based and network-based intrusion and misuse detection systems have concentrated on detecting network-based and internal attacks, but little work has addressed host-based detection of low-level network attacks. A major reason for this is the misuse detection system’s dependence on audit data and the absence of low-level network data in audit trails. This work defines low-level...

2005
Hansung Lee Jiyoung Song Daihee Park

intrusion detection system (IDS) is a device or software application that Li et al (2) proposed a fuzzy multi-class support vector machine algorithm, denoted. Detection System. Multiclass SVM, Neural Network, Support Vector Machine. network and (2) network based intrusion detection system which analyzes. of network intrusion detection systems for struggling progressively leading state-of-the ar...

Journal: :Computers & Security 2015
Eunhyun Kim Kyungwon Park Hyoungshick Kim Jaeseung Song

Users' phone numbers are popularly used for finding friends in instant messaging (IM) services. In this paper, we present a new security concern about this search feature through a case study with KakaoTalk which is the most widely used IM in Korea. We demonstrate that there are multiple ways of collecting victims' personal information such as their (display) names, phone numbers and photos, wh...

2000
Josué Kuri Gonzalo Navarro Ludovic Mé Laurent Heye

We present a pattern matching approach to the problem of misuse detection in a computer system, which is formalized as the problem of multiple approximate pattern matching. This permits very fast searching of potential attacks. We study the probability of matching of the model and its relation to the filtering efficiency of potential attacks within large audit trails. Experimental results show ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید