نتایج جستجو برای: misuse detection
تعداد نتایج: 574962 فیلتر نتایج به سال:
Recently machine learning based intrusion detection system developments have been subjected to extensive researches because they can detect both misuse detection and anomaly detection. In this paper, we propose an AdaBoost based algorithm for network intrusion detection system with single weak classifier. In this algorithm, the classifiers such as Bayes Net, Naïve Bayes and Decision tree are us...
According to the World Anti-Doping Agency (WADA) Prohibited List, anabolic agents consist of exogenous anabolic androgenic steroids (AAS), endogenous AAS and other anabolic agents such as clenbuterol and selective androgen receptor modulators (SARMs). Currently employed strategies for their improved detection include the prolongation of the detection windows for exogenous AAS, non-targeted and ...
Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to recognize predefined attack signatures. Attack languages, also known as detection languages, are used to describe attack signatures. Detection languages should be simple, expressive and flexible enough to help encode ...
The quantity of information that is collected and stored in computer systems continues to grow rapidly. At the same time, the sensitivity of such information (e.g., detailed medical records) often makes such information valuable to both external attackers, who may obtain information by compromising a system, and malicious insiders, who may misuse information by exercising their authorization. T...
Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach
Intrusion detection system (IDS) plays a vital role in defending our cyberspace against attacks. Either misuse-based IDS or anomaly-based IDS, or their combinations, however, can only partially reflect the true system state due to excessive false alerts, low detection rate, and inaccurate incident diagnosis. An automated response component built upon IDS therefore must consider the stale and im...
Secure physical environments are vulnerable to misuse by authorized users. To protect against potentially suspicious actions, data about the movement of users can be captured through the use of RFID tags and sensors, and patterns of suspicious behaviour detected in the captured data. This paper presents four types of suspicious patterns, algorithms for their detection, and the design and implem...
In order to avoid illegitimate use of any intruder, intrusion detection over the network is one of the critical issues. An intruder may enter any network or system or server by intruding malicious packets into the system in order to steal, sniff, manipulate or corrupt any useful and secret information, this process is referred to as intrusion whereas when packets are transmitted by intruder ove...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید