scispace - formally typeset
Proceedings ArticleDOI

An Intrusion-Detection Model

Reads0
Chats0
TLDR
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Abstract
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system.

read more

Citations
More filters
Proceedings ArticleDOI

Understanding intended behavior using models of low-level signals

TL;DR: A family of novel techniques to model the behavior of executing programs using low-level signals collected during executions provide a basis for predicting whether an execution of the program or program unit under test represents intended behavior.
Book ChapterDOI

Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis

TL;DR: This paper proposes the use of a personal smart card-based Intrusions Detection System to increase the performance and effectiveness of Intrusion Detection Systems as a whole.
Proceedings ArticleDOI

Towards Network Traffic Monitoring Using Deep Transfer Learning

TL;DR: Wang et al. as discussed by the authors used deep transfer learning techniques where they transferred the knowledge learned by their model in a source domain with plentiful computational and data resources to a target domain with sparse availability of both the resources.
Journal ArticleDOI

Dendritic Cell Algorithm and Dempster Belief Theory Based Approach for Intrusion Detection System

TL;DR: The presented system is about to analyze the network statistics under different parameters and identify the False Negative Rate and the Uncertainty Parameters and based on these parameters analysis, the intrusion will be identified.

SPARTA: A Graphical User Interface for Malicious Mobile Code Fingerprint-ing.

TL;DR: SPARTA is introduced and described, a graphical user interface used as a front end to a collection of tools written in C that collectively convert a log of registry system calls performed by an application into binary descriptions of PSTs and PSAs, which are models used to represent application behavior on Windowsbased systems.