scispace - formally typeset
Proceedings ArticleDOI

An Intrusion-Detection Model

Reads0
Chats0
TLDR
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Abstract
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system.

read more

Citations
More filters

Performance comparison between backpropagation algorithms applied to intrusion detection in computer network systems

TL;DR: In this paper, a topology of neural network intrusion detection system is proposed on which different backpropagation algorithms are benchmarked and a comparative analysis of algorithms is made and then the most optimum solution is selected with respect to mean square error.
Proceedings ArticleDOI

A similarity based approach for application DoS attacks detection

TL;DR: This paper presents a detection algorithm able to extract information analyzing features of the network traffic containing attacks, which exploits statistical methodologies for traffic categorization and has an excellent reliability.

A New Data Mining Based Network Intrusion Detection Model

TL;DR: A new ensemble boosted decision tree approach for intrusion detection system based on sophisticated algorithms rather than current signature base detections is proposed.
Proceedings ArticleDOI

An approach to detecting deliberately introduced defects and micro-defects in 3D printed objects

TL;DR: A quality assurance technology based on visible light sensing is applied to this challenge and its capability for detecting introduced defects of multiple sizes is assessed.
Journal ArticleDOI

Design and implementation of a decentralized prototype system for detecting distributed attacks

TL;DR: This paper presents the design and implementation of a decentralized research prototype intrusion detection system named coordinated attacks response and detection system (CARDS), which aims at detecting distributed attacks that cannot be detected using data collected at any single place.