Proceedings ArticleDOI
An Intrusion-Detection Model
Dorothy E. Denning
- pp 118-118
Reads0
Chats0
TLDR
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.Abstract:
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system.read more
Citations
More filters
Journal ArticleDOI
Drone Pilot Identification by Classifying Radio-Control Signals
TL;DR: It is shown that the radio control signal sent to an unmanned aerial vehicle (UAV) using a typical transmitter can be captured and analyzed to identify the controlling pilot using machine learning techniques.
Proceedings Article
Stopping Spam by Extrusion Detection.
TL;DR: In this paper, an automated processing of the email logs recorded on the "smarthost" provided by an ISP for their customer's outgoing email can be used to detect spam.
Proceedings ArticleDOI
Intrusion detection: systems and models
J.S. Sherif,T.G. Dearmond +1 more
TL;DR: A review of the state of the art andstate of the applicability of intrusion detection systems and models and a classification of literature pertaining to intrusion detection is presented.
Journal ArticleDOI
Variability and Trend-Based Generalized Rule Induction Model to NTL Detection in Power Companies
TL;DR: The paper presents two innovative statistical estimators to attach importance to variability and trend analysis of electric consumption and offers a predictive model, based on the Generalized Rule Induction (GRI) model, supplemented by a binary Quest tree classification method.
Proceedings ArticleDOI
A graph-based clustering algorithm for anomaly intrusion detection
TL;DR: A graph-based intrusion detection algorithm by using outlier detection method that based on local deviation coefficient (LDCGB) that is robust in the outlier's affection and able to detect any shape of cluster rather that the circle one only.