Yamoyany et al., 2002 - Google Patents
Utilizing Fuzzy Logic and Audit Logs for Effective Intrusion DetectionYamoyany et al., 2002
- Document ID
- 15852772461731423763
- Author
- Yamoyany D
- Botha M
- Publication year
- Publication venue
- INFORMATION TECHNOLOGY ON THE MOVE
External Links
- 238000001514 detection method 0 title abstract description 69
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hajj et al. | Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets | |
| Mukherjee et al. | Network intrusion detection | |
| Salem et al. | A survey of insider attack detection research | |
| Lunt | Automated audit trail analysis and intrusion detection: A survey | |
| Lee et al. | A framework for constructing features and models for intrusion detection systems | |
| Sundaram | An introduction to intrusion detection | |
| CN112653678B (en) | Network security situation perception analysis method and device | |
| Osareh et al. | Intrusion detection in computer networks based on machine learning algorithms | |
| Xie et al. | Seurat: A pointillist approach to anomaly detection | |
| Botha et al. | The utilization of artificial intelligence in a hybrid intrusion detection system | |
| Chaudhari et al. | Intrusion detection system: classification, techniques and datasets to implement | |
| Younus et al. | A survey on network security monitoring: tools and functionalities | |
| CN117375997A (en) | Malicious traffic attack security knowledge plane construction method based on honey points | |
| Kuang et al. | DNIDS: a dependable network intrusion detection system using the CSI-KNN algorithm | |
| El-Taj et al. | Intrusion detection and prevention response based on signature-based and anomaly-based: Investigation study | |
| Wen et al. | Detecting and predicting APT based on the study of cyber kill chain with hierarchical knowledge reasoning | |
| Naidu et al. | An effective approach to network intrusion detection system using genetic algorithm | |
| Agrawal et al. | A SURVEY ON ATTACKS AND APPROACHES OF INTRUSION DETECTION SYSTEMS. | |
| Bhardwaj et al. | Machine learning and artificial intelligence for detecting cyber security threats in iot environmment | |
| Agrawal et al. | A review on various methods of intrusion detection system | |
| CN110247888A (en) | A kind of computer network security Situation Awareness platform architecture | |
| Cai et al. | Medical big data intrusion detection system based on virtual data analysis from assurance perspective | |
| Yamoyany et al. | Utilizing Fuzzy Logic and Audit Logs for Effective Intrusion Detection | |
| Shibli et al. | MagicNET: The Human Immune System and Network Security System | |
| Rani | A perspective for intrusion detection & prevention in cloud environment |