Labib, 2004 - Google Patents
Computer security and intrusion detectionLabib, 2004
- Document ID
- 3424013356341211849
- Author
- Labib K
- Publication year
- Publication venue
- XRDS: Crossroads, The ACM Magazine for Students
External Links
Snippet
Computer attacks are now commonplace. By connecting your computer to the Internet, you increase the risk of having someone break in, install malicious programs and tools on it, and possibly use it to attack other machines on the Internet by controlling it remotely. Several …
- 238000001514 detection method 0 title abstract description 35
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Martins et al. | Host-based IDS: A review and open issues of an anomaly detection system in IoT | |
Ghorbani et al. | Network intrusion detection and prevention: concepts and techniques | |
Ning et al. | Analyzing intensive intrusion alerts via correlation | |
McHugh | Intrusion and intrusion detection | |
Norouzian et al. | Classifying attacks in a network intrusion detection system based on artificial neural networks | |
Labib | Computer security and intrusion detection | |
Kim et al. | DSS for computer security incident response applying CBR and collaborative response | |
Ádám et al. | Artificial neural network based IDS | |
Tsai et al. | Intrusion detection: a machine learning approach | |
Beigh et al. | Intrusion Detection and Prevention System: Classification and Quick | |
Argauer et al. | VTAC: Virtual terrain assisted impact assessment for cyber attacks | |
Baazeem | Cybersecurity: BotNet Threat Detection Across the Seven-Layer ISO-OSI Model Using Machine Learning Techniques | |
Arvidson et al. | Intrusion Detection Systems: Technologies, Weaknesses and Trends | |
Al-Sadhan | Detecting Distributed Denial of Service Attacks in IPV6 by Using Artificial Intelligence Techniques | |
Nalavade et al. | Intrusion prevention systems: data mining approach | |
Canpolat et al. | Boosting Based IDS System for Local Network Intrusions | |
Bhardwaj et al. | Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment | |
Pierre et al. | Hybrid machine learning mechanism for intrusion detection systems in network security | |
Mahfouz | Towards a Holistic Efficient Stacking Ensemble Intrusion Detection System Using Newly Generated Heterogeneous Datasets | |
Allen | Analysis, detection, and modeling of attacks in computer communication networks | |
Gates | The modeling and detection of distributed port scans: a thesis proposal | |
Nuangpookka | The Need for an Internally Developed Intrusion Detection System for Web Servers | |
Sharma et al. | Towards Configured Intrusion Detection Systems | |
Mandujano | A multiagent approach to outbound intrusion detection | |
Hamed | An agent-based intrusion detection system using fuzzy logic for computer system threat evaluation |