Pickering, 2002 - Google Patents
Evaluating the viability of intrusion detection system benchmarkingPickering, 2002
View PDF- Document ID
- 6325881553768774005
- Author
- Pickering K
- Publication year
- Publication venue
- Bachelor Thesis, University of Virginia, US
External Links
Snippet
I would like to thank Dr. David Evans, my Technical Advisor, for his support and advisory work during the course of this project, and Dr. Patricia Click for helping me keep this task managed properly, as well as the aid she provided as my TCC advisor with editing. I would …
- 238000001514 detection method 0 title abstract description 58
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Priya et al. | Containerized cloud-based honeypot deception for tracking attackers | |
Koziol | Intrusion detection with Snort | |
Kendall | A database of computer attacks for the evaluation of intrusion detection systems | |
Debar | An introduction to intrusion-detection systems | |
US9769204B2 (en) | Distributed system for Bot detection | |
Joshi et al. | Honeypots: a new paradigm to information security | |
US20030084322A1 (en) | System and method of an OS-integrated intrusion detection and anti-virus system | |
Sainis et al. | Classification of various dataset for intrusion detection system | |
Jha et al. | Building agents for rule-based intrusion detection system | |
Mai et al. | J-Honeypot: a Java-based network deception tool with monitoring and intrusion detection | |
Diebold et al. | A honeypot architecture for detecting and analyzing unknown network attacks | |
Pickering | Evaluating the viability of intrusion detection system benchmarking | |
Al-Hammadi | Behavioural correlation for malicious bot detection | |
Arvidson et al. | Intrusion Detection Systems: Technologies, Weaknesses and Trends | |
Monteiro | How intrusion detection can improve software decoy applications | |
Helmer | Intelligent multi-agent system for intrusion detection and countermeasures | |
Lukatsky et al. | Protect your information with intrusion detection | |
Goebel | Advanced Honeynet based Intrusion Detection | |
Bove | Using honeypots to detect and analyze attack patterns on cloud infrastructures | |
Cui | Automating malware detection by inferring intent | |
Thakare et al. | Computer attacks and intrusion detection system: A need review | |
Verwoerd | Active network security | |
Ye et al. | Attack profiles to derive data observations, features, and characteristics of cyber attacks | |
Badger | Scalable data analytics pipeline for real-time attack detection: design, validation, and deployment in a honeypot environment | |
Wu et al. | Integrated vulnerability management system for enterprise networks |