scispace - formally typeset
Proceedings ArticleDOI

An Intrusion-Detection Model

Reads0
Chats0
TLDR
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Abstract
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system.

read more

Citations
More filters
Proceedings ArticleDOI

An intrusion detection system based on neural network

TL;DR: The paper advocates a network IDS model based on BP neural network, which can make the IDS adaptable to the dynamic changes characteristics of user's behavior.
Journal ArticleDOI

Enhanced ANTSEC framework with cluster based cooperative caching in mobile ad hoc networks

TL;DR: AntHocNet+Security (ANTSEC) framework is proposed that includes an enhanced cooperative caching scheme embedded with artificial immune system that improves security by injecting immunity into the data packets, improves the packet delivery ratio and reduces end-to-end delay using cross layer design.
Book ChapterDOI

PPIDS: privacy preserving intrusion detection system

TL;DR: A new privacy preserving method in intrusion detection system is proposed by applying cryptographic methods to log files to meet the enhanced privacy of users as well as the security of network providers without TTP.
Posted Content

Pattern detection with rare item -set mining

TL;DR: This paper presents a novel approach towards the discovery of non-present patterns using rare item-set mining.
Proceedings ArticleDOI

Indirect Human Computer Interaction-Based Biometrics for Intrusion Detection Systems

TL;DR: This paper concentrates on the review and analysis of indirect human computer interaction-based biometrics frequently used in intrusion detection systems and an experimental demonstration of an intrusion detection system based on network traffic analysis.