Proceedings ArticleDOI
An Intrusion-Detection Model
Dorothy E. Denning
- pp 118-118
Reads0
Chats0
TLDR
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.Abstract:
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system.read more
Citations
More filters
Proceedings ArticleDOI
Intrusion Detection Using Ensemble of SVM Classifiers
TL;DR: In fact, the experiments show that Intrusion Detection performances can be improved by combining an ensemble of SVM classifiers.
Dissertation
Automatic and adaptive preprocessing for the development of predictive models
TL;DR: A novel hybrid strategy combining Bayesian optimisation and common adaptive techniques is proposed to automatically adapt Multi-Component Predictive System (MCPS) and the feasibility of applying such automatic techniques for building and maintaining predictive models for real chemical production processes is evaluated.
Journal ArticleDOI
On the potential applications of data mining for information security provision of cloud-based environments
TL;DR: An overview of several applications of techniques and models of data mining in applied information security systems is presented, with special focus on the new and actively developed area of cloud-based computing environments.
Proceedings ArticleDOI
Computational intelligence and neuromorphic computing potential for cybersecurity applications
Robinson E. Pino,Michael J. Shevenell,Hasan Cam,Pierre Mouallem,Justin L. Shumaker,Arthur H. Edwards +5 more
TL;DR: In computational intelligence, neuromorphic computing promises to allow for the development of computing systems able to imitate natural neurobiological processes and form the foundation for intelligent system architectures.