[go: up one dir, main page]

Yamoyany et al., 2002 - Google Patents

Utilizing Fuzzy Logic and Audit Logs for Effective Intrusion Detection

Yamoyany et al., 2002

Document ID
15852772461731423763
Author
Yamoyany D
Botha M
Publication year
Publication venue
INFORMATION TECHNOLOGY ON THE MOVE

External Links

Continue reading at scholar.google.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Hajj et al. Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets
Mukherjee et al. Network intrusion detection
Salem et al. A survey of insider attack detection research
Lunt Automated audit trail analysis and intrusion detection: A survey
Lee et al. A framework for constructing features and models for intrusion detection systems
Sundaram An introduction to intrusion detection
CN112653678B (en) Network security situation perception analysis method and device
Osareh et al. Intrusion detection in computer networks based on machine learning algorithms
Xie et al. Seurat: A pointillist approach to anomaly detection
Botha et al. The utilization of artificial intelligence in a hybrid intrusion detection system
Chaudhari et al. Intrusion detection system: classification, techniques and datasets to implement
Younus et al. A survey on network security monitoring: tools and functionalities
CN117375997A (en) Malicious traffic attack security knowledge plane construction method based on honey points
Kuang et al. DNIDS: a dependable network intrusion detection system using the CSI-KNN algorithm
El-Taj et al. Intrusion detection and prevention response based on signature-based and anomaly-based: Investigation study
Wen et al. Detecting and predicting APT based on the study of cyber kill chain with hierarchical knowledge reasoning
Naidu et al. An effective approach to network intrusion detection system using genetic algorithm
Agrawal et al. A SURVEY ON ATTACKS AND APPROACHES OF INTRUSION DETECTION SYSTEMS.
Bhardwaj et al. Machine learning and artificial intelligence for detecting cyber security threats in iot environmment
Agrawal et al. A review on various methods of intrusion detection system
CN110247888A (en) A kind of computer network security Situation Awareness platform architecture
Cai et al. Medical big data intrusion detection system based on virtual data analysis from assurance perspective
Yamoyany et al. Utilizing Fuzzy Logic and Audit Logs for Effective Intrusion Detection
Shibli et al. MagicNET: The Human Immune System and Network Security System
Rani A perspective for intrusion detection & prevention in cloud environment