نتایج جستجو برای: misuse detection

تعداد نتایج: 574962  

2017
P. Natesan Ming-Yang Su

Recently machine learning based intrusion detection system developments have been subjected to extensive researches because they can detect both misuse detection and anomaly detection. In this paper, we propose an AdaBoost based algorithm for network intrusion detection system with single weak classifier. In this algorithm, the classifiers such as Bayes Net, Naïve Bayes and Decision tree are us...

2014
Hans Geyer Wilhelm Schänzer Mario Thevis

According to the World Anti-Doping Agency (WADA) Prohibited List, anabolic agents consist of exogenous anabolic androgenic steroids (AAS), endogenous AAS and other anabolic agents such as clenbuterol and selective androgen receptor modulators (SARMs). Currently employed strategies for their improved detection include the prolongation of the detection windows for exogenous AAS, non-targeted and ...

Journal: :JSW 2008
Md. Ahsan Habib Krisna Prasad Pawdel Mohammad Rajiullah Prashanta Man Shrestha

Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to recognize predefined attack signatures. Attack languages, also known as detection languages, are used to describe attack signatures. Detection languages should be simple, expressive and flexible enough to help encode ...

2017
Aron Laszka Yevgeniy Vorobeychik Daniel Fabbri Chao Yan Bradley Malin

The quantity of information that is collected and stored in computer systems continues to grow rapidly. At the same time, the sensitivity of such information (e.g., detailed medical records) often makes such information valuable to both external attackers, who may obtain information by compromising a system, and malicious insiders, who may misuse information by exercising their authorization. T...

Journal: :Computers & Security 2009
Zonghua Zhang Pin-Han Ho Liwen He

Intrusion detection system (IDS) plays a vital role in defending our cyberspace against attacks. Either misuse-based IDS or anomaly-based IDS, or their combinations, however, can only partially reflect the true system state due to excessive false alerts, low detection rate, and inaccurate incident diagnosis. An automated response component built upon IDS therefore must consider the stale and im...

2010
Robert P. Biuk-Aghai Yain-Whar Si Simon Fong Peng-Fan Yan

Secure physical environments are vulnerable to misuse by authorized users. To protect against potentially suspicious actions, data about the movement of users can be captured through the use of RFID tags and sensors, and patterns of suspicious behaviour detected in the captured data. This paper presents four types of suspicious patterns, algorithms for their detection, and the design and implem...

2016
Harvinder Pal Singh Meenakshi Sharma

In order to avoid illegitimate use of any intruder, intrusion detection over the network is one of the critical issues. An intruder may enter any network or system or server by intruding malicious packets into the system in order to steal, sniff, manipulate or corrupt any useful and secret information, this process is referred to as intrusion whereas when packets are transmitted by intruder ove...

Journal: :AL-Rafidain Journal of Computer Sciences and Mathematics 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید