scispace - formally typeset
Proceedings ArticleDOI

An Intrusion-Detection Model

Reads0
Chats0
TLDR
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Abstract
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system.

read more

Citations
More filters
Journal ArticleDOI

Drone Pilot Identification by Classifying Radio-Control Signals

TL;DR: It is shown that the radio control signal sent to an unmanned aerial vehicle (UAV) using a typical transmitter can be captured and analyzed to identify the controlling pilot using machine learning techniques.
Proceedings Article

Stopping Spam by Extrusion Detection.

TL;DR: In this paper, an automated processing of the email logs recorded on the "smarthost" provided by an ISP for their customer's outgoing email can be used to detect spam.
Proceedings ArticleDOI

Intrusion detection: systems and models

TL;DR: A review of the state of the art andstate of the applicability of intrusion detection systems and models and a classification of literature pertaining to intrusion detection is presented.
Journal ArticleDOI

Variability and Trend-Based Generalized Rule Induction Model to NTL Detection in Power Companies

TL;DR: The paper presents two innovative statistical estimators to attach importance to variability and trend analysis of electric consumption and offers a predictive model, based on the Generalized Rule Induction (GRI) model, supplemented by a binary Quest tree classification method.
Proceedings ArticleDOI

A graph-based clustering algorithm for anomaly intrusion detection

TL;DR: A graph-based intrusion detection algorithm by using outlier detection method that based on local deviation coefficient (LDCGB) that is robust in the outlier's affection and able to detect any shape of cluster rather that the circle one only.