scispace - formally typeset
Proceedings ArticleDOI

An Intrusion-Detection Model

Reads0
Chats0
TLDR
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described, based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage.
Abstract
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system.

read more

Citations
More filters

A Formalised Approach to Designing Sonification Systems for Network−Security Monitoring

TL;DR: The key role that sonification, if implemented correctly, could play in addressing shortcomings of traditional network-monitoring methods is identified and a formalised model for designing sonifications for network-security monitoring is presented.
Proceedings ArticleDOI

A Model of Collaborative Intrusion Detection System Based on Multi-agents

TL;DR: A collaborative intrusion detection model based on multi-agents which provides dynamic adaptability to the changing environment and attacks and the concept of coordination domain which facilitates the management of collaborative detection is proposed.
Journal ArticleDOI

Organizational transactions with real time monitoring and auditing

TL;DR: A solution is presented which makes it possible to control and audit organizational transactions in real time, helping to determine the degree of reliability with which they are carried out, mitigating the organizational risk.
Journal Article

Intrusion detection using artificial neural networks with best set of features.

TL;DR: The Multi Layer Perceptron (MLP) supervised NN is used to train the relevant features alone and improves the Detection Rate (DTR) for all types of attacks when compared to Intrusion detection system which uses all features and selected features using genetic algorithm with MLP NN as the classifier.
Proceedings ArticleDOI

A combined system for 3D printing cybersecurity

TL;DR: A visible light sensing-based verification system’s efficacy as a means of thwarting cybersecurity threats to 3D printing and whether reliance on an independent CAD model is appropriate is considered.