Ng et al., 2015 - Google Patents
Applying data mining techniques to intrusion detectionNg et al., 2015
- Document ID
- 4636698423315618602
- Author
- Ng J
- Joshi D
- Banik S
- Publication year
- Publication venue
- 2015 12th International Conference on Information Technology-New Generations
External Links
Snippet
In our current society, the threat of cyber intrusion is increasingly high and harmful. With the rise of usage in computers, criminal activity has also shifted from physical intrusion into cyber intrusion. Intrusion detection systems provide the ability to identify security breaches in …
- 238000001514 detection method 0 title abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ng et al. | Applying data mining techniques to intrusion detection | |
JP6894003B2 (en) | Defense against APT attacks | |
Mairh et al. | Honeypot in network security: a survey | |
Tjhai et al. | Investigating the problem of IDS false alarms: An experimental study using Snort | |
CN111756702B (en) | Data security protection method, device, equipment and storage medium | |
Sandhu et al. | A survey of intrusion detection & prevention techniques | |
Keong Ng et al. | VoterChoice: A ransomware detection honeypot with multiple voting framework | |
Nursetyo et al. | Website and network security techniques against brute force attacks using honeypot | |
Yamada et al. | RAT-based malicious activities detection on enterprise internal networks | |
Wang et al. | RansomTracer: exploiting cyber deception for ransomware tracing | |
Djanali et al. | SQL injection detection and prevention system with raspberry Pi honeypot cluster for trapping attacker | |
Onik et al. | A novel approach for network attack classification based on sequential questions | |
JP2014110046A (en) | Illegal access detection and processing system, device, method, and computer readable recording medium | |
Hidhaya et al. | Intrusion protection against SQL injection and cross site scripting attacks using a reverse proxy | |
Dong et al. | User behaviour based phishing websites detection | |
Vasudeo et al. | IMMIX-intrusion detection and prevention system | |
Zhao et al. | Network security model based on active defense and passive defense hybrid strategy | |
Kontaxis et al. | Computational decoys for cloud security | |
CN112118204B (en) | A method and system for perceiving illegal access to Windows file system | |
Hatada et al. | Finding new varieties of malware with the classification of network behavior | |
Malik et al. | Botnet and botnet detection techniques | |
Singh et al. | A survey on Malware, Botnets and their detection | |
Vo et al. | Protecting web 2.0 services from botnet exploitations | |
Kaur | A secure and smart framework for preventing ransomware attack | |
KR101851680B1 (en) | System, apparatus, method and computer readable recording medium for detecting and treating illegal access |