Proceedings ArticleDOI
An Intrusion-Detection Model
Dorothy E. Denning
- pp 118-118
Reads0
Chats0
TLDR
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.Abstract:
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system.read more
Citations
More filters
Proceedings ArticleDOI
An intrusion detection system based on neural network
TL;DR: The paper advocates a network IDS model based on BP neural network, which can make the IDS adaptable to the dynamic changes characteristics of user's behavior.
Journal ArticleDOI
Enhanced ANTSEC framework with cluster based cooperative caching in mobile ad hoc networks
TL;DR: AntHocNet+Security (ANTSEC) framework is proposed that includes an enhanced cooperative caching scheme embedded with artificial immune system that improves security by injecting immunity into the data packets, improves the packet delivery ratio and reduces end-to-end delay using cross layer design.
Book ChapterDOI
PPIDS: privacy preserving intrusion detection system
TL;DR: A new privacy preserving method in intrusion detection system is proposed by applying cryptographic methods to log files to meet the enhanced privacy of users as well as the security of network providers without TTP.
Posted Content
Pattern detection with rare item -set mining
TL;DR: This paper presents a novel approach towards the discovery of non-present patterns using rare item-set mining.
Proceedings ArticleDOI
Indirect Human Computer Interaction-Based Biometrics for Intrusion Detection Systems
TL;DR: This paper concentrates on the review and analysis of indirect human computer interaction-based biometrics frequently used in intrusion detection systems and an experimental demonstration of an intrusion detection system based on network traffic analysis.