نتایج جستجو برای: misuse detection

تعداد نتایج: 574962  

Journal: :CoRR 2010
S. M. Aqil Burney M. Sadiq Ali Khan

The goal of an Intrusion Detection is inadequate to detect errors and unusual activity on a network or on the hosts belonging to a local network by monitoring network activity. Algorithms for building detection models are broadly classified into two categories, Misuse Detection and Anomaly Detection. The proposed approach should be taken into account, as the security system violations caused by...

2012
M. Moorthy

ISSN 2250 – 110X | © 2011 Bonfring Abstract--The drawback of the anomaly based intrusion detection in a wireless network is the high rate of false positive. By designing a hybrid intrusion detection system can solve this by connecting a misuse detection module to the anomaly detection module. In this paper, we propose to develop a hybrid intrusion detection system for wireless local area networ...

2000
James Cannady

Misuse detection is the process of attempting to identify instances of network attacks by comparing current activity against the expected actions of an intruder. Most current approaches to misuse detection involve the use of rule-based expert systems to identify indications of known attacks. However, these techniques are less successful in identifying attacks which vary from expected patterns. ...

1998
James Cannady

Misuse detection is the process of attempting to identify instances of network attacks by comparing current activity against the expected actions of an intruder. Most current approaches to misuse detection involve the use of rule-based expert systems to identify indications of known attacks. However, these techniques are less successful in identifying attacks which vary from expected patterns. ...

2008
Ulrich Flegel Florian Kerschbaum Richard Wacker

In this paper we investigate the privacy dimension of collaborative fraud detection envisioned for outsourcing scenarios. Firstly, we investigate the privacy requirements derived from privacy law and present the resulting judicial argument for pseudonymizing audit data generated for the purpose of fraud detection. Second, we summarize the requirements for such pseudonymization derived from the ...

2001
Robert F. Erbacher

As computer networks and associated infrastructures become ever more important to the nation’s commerce and communication, it is becoming exceedingly critical that these networks be managed effectively. Current techniques, which rely on manual or log based analysis, are too slow and ineffective to handle the explosive growth of network infrastructures. We have developed visualization techniques...

2014
M. S. Chaudhari

With the rapid growth of computer networks during the past few years, security has become a crucial issue for modern computer systems. A good way to detect illegitimate use is through monitoring unusual user activity. This can be achieved with an Intrusion Detection System, which identifies attacks and reacts by generating alerts or by blocking the unwanted data/traffic. These systems are mainl...

2014
P. Ananthi

Intrusion Detection System (IDS) plays a vital factor in providing security to the networks through detecting malicious activities. Due to the extensive advancements in the computer networking, IDS has become an active area of research to determine various types of attacks in the networks. A large number of intrusion detection approaches are available in the literature using several traditional...

1998
Jia-Ling Lin Xiaoyang Sean Wang Sushil Jajodia

ion-Based Misuse Detection: High-Level Specifications and Adaptable Strategies Jia-Ling Lin, X. Sean Wang, Sushil Jajodia Center for Secure Information Systems George Mason University, Fairfax, VA 22030-4444 {jllin,xywang,jajodia}@gmu.edu http://isse.gmu.edu/ ̃csis

2007
Christina Chung Michael Gertz Karl Levitt

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید