[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Smaha et al., 1988 - Google Patents

Haystack: An intrusion detection system

Smaha et al., 1988

View PDF
Document ID
15656235999422790200
Author
Smaha S
et al.
Publication year
Publication venue
Fourth Aerospace Computer Security Applications Conference

External Links

Snippet

Haystack is a prototype system for the detection of intrusions Haystack reduces voluminous system audit trails to short summaries of user behaviors, anomalous events, and security incidents. This is designed to help the System Security Officer (SSO) detect and investigate …
Continue reading at homeostasis.scs.carleton.ca (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Similar Documents

Publication Publication Date Title
Smaha Haystack: An intrusion detection system
Lunt Automated audit trail analysis and intrusion detection: A survey
Salem et al. A survey of insider attack detection research
Lunt A survey of intrusion detection techniques
Bertino et al. Towards mechanisms for detection and prevention of data exfiltration by insiders: Keynote talk paper
Stolfo et al. A comparative evaluation of two algorithms for windows registry anomaly detection
Price HOST-BASED MISUSE DETECTION AND CONVENTIONAL OPERATING SYSTEMS'AUDIT DATA COLLECTION
Kaghazgaran et al. Toward an Insider Threat Detection Framework Using Honey Permissions.
CN117708880A (en) Intelligent security processing method and system for banking data
Mehnaz et al. Ghostbuster: A fine-grained approach for anomaly detection in file system accesses
Ben Salem et al. Masquerade attack detection using a search-behavior modeling approach
RU2610395C1 (en) Method of computer security distributed events investigation
McAuliffe et al. Is your computer being misused? A survey of current intrusion detection system technology
Fagade et al. Malicious insider threat detection: A conceptual model
Singh et al. Trust factor-based analysis of user behavior using sequential pattern mining for detecting intrusive transactions in databases
Jin et al. Architecture for data collection in database intrusion detection systems
Choudhary et al. Cyber Security With Emerging Technologies & Challenges
Franqueira et al. External insider threat: A real security challenge in enterprise value webs
Furnell et al. A conceptual architecture for real‐time intrusion monitoring
Rathod et al. Database intrusion detection by transaction signature
Clyde Insider threat identification systems
Gaines et al. Some security principles and their application to computer security
Lunt Using statistics to track intruders
Ben Salem Towards effective masquerade attack detection
Fischer-Hübner et al. Combining verified and adaptive system components towards more secure computer architectures