[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ng et al., 2015 - Google Patents

Applying data mining techniques to intrusion detection

Ng et al., 2015

Document ID
4636698423315618602
Author
Ng J
Joshi D
Banik S
Publication year
Publication venue
2015 12th International Conference on Information Technology-New Generations

External Links

Snippet

In our current society, the threat of cyber intrusion is increasingly high and harmful. With the rise of usage in computers, criminal activity has also shifted from physical intrusion into cyber intrusion. Intrusion detection systems provide the ability to identify security breaches in …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
Ng et al. Applying data mining techniques to intrusion detection
JP6894003B2 (en) Defense against APT attacks
Mairh et al. Honeypot in network security: a survey
Tjhai et al. Investigating the problem of IDS false alarms: An experimental study using Snort
CN111756702B (en) Data security protection method, device, equipment and storage medium
Sandhu et al. A survey of intrusion detection & prevention techniques
Keong Ng et al. VoterChoice: A ransomware detection honeypot with multiple voting framework
Nursetyo et al. Website and network security techniques against brute force attacks using honeypot
Yamada et al. RAT-based malicious activities detection on enterprise internal networks
Wang et al. RansomTracer: exploiting cyber deception for ransomware tracing
Djanali et al. SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker
Onik et al. A novel approach for network attack classification based on sequential questions
JP2014110046A (en) Illegal access detection and processing system, device, method, and computer readable recording medium
Hidhaya et al. Intrusion protection against SQL injection and cross site scripting attacks using a reverse proxy
Dong et al. User behaviour based phishing websites detection
Vasudeo et al. IMMIX-intrusion detection and prevention system
Zhao et al. Network security model based on active defense and passive defense hybrid strategy
Kontaxis et al. Computational decoys for cloud security
CN112118204B (en) A method and system for perceiving illegal access to Windows file system
Hatada et al. Finding new varieties of malware with the classification of network behavior
Malik et al. Botnet and botnet detection techniques
Singh et al. A survey on Malware, Botnets and their detection
Vo et al. Protecting web 2.0 services from botnet exploitations
Kaur A secure and smart framework for preventing ransomware attack
KR101851680B1 (en) System, apparatus, method and computer readable recording medium for detecting and treating illegal access