[go: up one dir, main page]

Labib, 2004 - Google Patents

Computer security and intrusion detection

Labib, 2004

Document ID
3424013356341211849
Author
Labib K
Publication year
Publication venue
XRDS: Crossroads, The ACM Magazine for Students

External Links

Snippet

Computer attacks are now commonplace. By connecting your computer to the Internet, you increase the risk of having someone break in, install malicious programs and tools on it, and possibly use it to attack other machines on the Internet by controlling it remotely. Several …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Martins et al. Host-based IDS: A review and open issues of an anomaly detection system in IoT
Ghorbani et al. Network intrusion detection and prevention: concepts and techniques
Ning et al. Analyzing intensive intrusion alerts via correlation
McHugh Intrusion and intrusion detection
Norouzian et al. Classifying attacks in a network intrusion detection system based on artificial neural networks
Labib Computer security and intrusion detection
Kim et al. DSS for computer security incident response applying CBR and collaborative response
Ádám et al. Artificial neural network based IDS
Tsai et al. Intrusion detection: a machine learning approach
Beigh et al. Intrusion Detection and Prevention System: Classification and Quick
Argauer et al. VTAC: Virtual terrain assisted impact assessment for cyber attacks
Baazeem Cybersecurity: BotNet Threat Detection Across the Seven-Layer ISO-OSI Model Using Machine Learning Techniques
Arvidson et al. Intrusion Detection Systems: Technologies, Weaknesses and Trends
Al-Sadhan Detecting Distributed Denial of Service Attacks in IPV6 by Using Artificial Intelligence Techniques
Nalavade et al. Intrusion prevention systems: data mining approach
Canpolat et al. Boosting Based IDS System for Local Network Intrusions
Bhardwaj et al. Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment
Pierre et al. Hybrid machine learning mechanism for intrusion detection systems in network security
Mahfouz Towards a Holistic Efficient Stacking Ensemble Intrusion Detection System Using Newly Generated Heterogeneous Datasets
Allen Analysis, detection, and modeling of attacks in computer communication networks
Gates The modeling and detection of distributed port scans: a thesis proposal
Nuangpookka The Need for an Internally Developed Intrusion Detection System for Web Servers
Sharma et al. Towards Configured Intrusion Detection Systems
Mandujano A multiagent approach to outbound intrusion detection
Hamed An agent-based intrusion detection system using fuzzy logic for computer system threat evaluation