نتایج جستجو برای: misuse detection
تعداد نتایج: 574962 فیلتر نتایج به سال:
Many security incidents involve legitimate users who misuse their existing privileges, such that they have the system-level right to perform an action, but not the moral or ethical rights to do so. Current Intrusion Detection Systems are ineffective in this context, because they do not have knowledge of user responsibilities, the normal working scope for a particular position, or the separation...
Instant messaging software, as a convenient network communication tool, is becoming more and more popular. At the same time, it also brings risks in security of local area network (LAN). Through studying in typical instant messaging software and detected by the combination of misuse detection and protocol analysis, an architecture of detecting and blocking mechanism of instant messaging softwar...
Misuse detection can be addressed as an optimization problem, where the problem is to find an array of possible intrusions x that maximizes a function f (·) subject to a constraint r imposed by a user’s actions performed on a computer. This position paper presents and compares two ways of finding x, in audit data, by using neural networks and genetic algorithms.
This chapter examines the state of modern intrusion detection, with a particular emphasis on the emerging approach of data mining. The discussion parallels two important aspects of intrusion detection: general detection strategy (misuse detection versus anomaly detection) and data source (individual hosts versus network traffic). Misuse detection attempts to match known patterns of intrusion, w...
BACKGROUND Substance misuse among the working population results in increasing economic costs. General practitioners (GPs) and occupational physicians (OPs) can play a central role in detecting and managing substance misuse in the working population. Their collaboration could be critical in coordinating care, in facilitating rehabilitation and in reducing sickness absence. AIMS To search guid...
We present the architecture of an automatic early warning system (EWS) that aims at providing predictions and advice regarding security threats in information and communication technology without incorporation of cognitive abilities of humans and forms the basis for drawing a situation picture. Our EWS particularly targets the growing malware threat and shall achieve the required capabilities b...
With the explosion of the Internet and its use, the development of security mechanims are quite important in order to preserve the confidentiality, integrity, and availability of data stored in computers. However, the growth of intrusions can make such mechanisms almost unusable, in the sense that the computation time or space needed in order to mantain them can grow exponentially. This positio...
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks carry voice, data, and multimedia traffic over the Internet, providing users with the information they want in any format, amount, device, place or moment. Still, there are certain issues, such as the emerging security...
BACKGROUND Opioid misuse can complicate chronic pain management, and the non-medical use of opioids is a growing public health problem. The incidence and risk factors for opioid misuse in patients with chronic pain, however, have not been well characterized. We conducted a prospective cohort study to determine the one-year incidence and predictors of opioid misuse among patients enrolled in a c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید