Malek et al., 2018 - Google Patents
User Behaviour based Intrusion Detection System OverviewMalek et al., 2018
View PDF- Document ID
- 792020570444094546
- Author
- Malek Z
- Trivedi B
- Publication year
- Publication venue
- International Journal for Research in Applied Science & Engineering Technology
External Links
Snippet
An intrusion detection is a techniques used to identify attack on the computer, hence the need of effective intrusion detection system is must. It is impossible to develop completely secure system because highly secure systems have security flaws and they are vulnerable …
- 238000001514 detection method 0 title abstract description 67
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/18—Prevention or correction of operating errors
- G08B29/183—Single detectors using dual technologies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bridges et al. | A survey of intrusion detection systems leveraging host data | |
Mehmood et al. | Privilege escalation attack detection and mitigation in cloud using machine learning | |
Hauer | Data and information leakage prevention within the scope of information security | |
Fang et al. | A practical model based on anomaly detection for protecting medical IoT control services against external attacks | |
Ahmed et al. | A survey of network anomaly detection techniques | |
Siadati et al. | Detecting structurally anomalous logins within enterprise networks | |
Biermann et al. | A comparison of intrusion detection systems | |
Garitano et al. | A review of SCADA anomaly detection systems | |
Hamed et al. | A survey and taxonomy of classifiers of intrusion detection systems | |
Kim et al. | SoK: A Systematic Review of Insider Threat Detection. | |
Yu | A survey of anomaly intrusion detection techniques | |
Ávila et al. | Use of security logs for data leak detection: a systematic literature review | |
Subaira et al. | Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey | |
Sahasrabuddhe et al. | Survey on intrusion detection system using data mining techniques | |
Pham et al. | Machine learning techniques for web intrusion detection—a comparison | |
Quezada et al. | Real-time bot infection detection system using DNS fingerprinting and machine-learning | |
Poudyal et al. | Malware analytics: Review of data mining, machine learning and big data perspectives | |
Bishukarma | Adaptive AI-based anomaly detection framework for SaaS platform security | |
Makarova | Determining the choice of attack methods approach | |
Majidpour et al. | Application of deep learning to enhance the accuracy of intrusion detection in modern computer networks | |
Ramzan et al. | An Innovative Machine Learning based end-to-end Data Security Framework in Emerging Cloud Computing Databases and Integrated Paradigms: Analysis on Taxonomy, challenges, and Opportunities | |
Malek et al. | User Behaviour based Intrusion Detection System Overview | |
Rathod et al. | Database intrusion detection by transaction signature | |
Mohammad et al. | A novel local network intrusion detection system based on support vector machine | |
Yazdani et al. | Intelligent Detection of Intrusion into Databases Using Extended Classifier System. |