Smaha et al., 2018 - Google Patents
Software Tools for Detecting Misuse on Unix SystemsSmaha et al., 2018
View PDF- Document ID
- 17879048184775358059
- Author
- Smaha S
- Winslow J
- Publication year
- Publication venue
- Handbook of Heterogeneous Networking
External Links
Snippet
Experience has shown that most computer misuse is perpetrated by authorized insiders, and it may be difficult to prevent abuse of assigned privilege. In addition, increased network connectivity over the Internet and other national networks greatly magnifies the risk of …
- 230000035515 penetration 0 abstract description 2
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN114978584B (en) | Network security protection security method and system based on unit units | |
US7398389B2 (en) | Kernel-based network security infrastructure | |
US6405318B1 (en) | Intrusion detection system | |
Miloslavskaya | Security operations centers for information security incident management | |
EP2577545A2 (en) | Security threat detection associated with security events and an actor category model | |
Marinova-Boncheva | A short survey of intrusion detection systems | |
WO2011149773A2 (en) | Security threat detection associated with security events and an actor category model | |
Bishop et al. | The threat from the net [Internet security] | |
Beigh et al. | Intrusion detection and prevention system: issues and challenges | |
Vasudeo et al. | IMMIX-intrusion detection and prevention system | |
Nallaperumal | CyberSecurity Analytics to Combat Cyber Crimes | |
Furnell et al. | A conceptual architecture for real‐time intrusion monitoring | |
Jouini et al. | Threats classification: state of the art | |
EP1378813A2 (en) | Security policy enforcement systems | |
Raut | Log based intrusion detection system | |
Badea et al. | Computer networks security based on the detection of user's behavior | |
Smaha et al. | Software Tools for Detecting Misuse on Unix Systems | |
LaPadula | State of the art in anomaly detection and reaction | |
Vuppala et al. | Intrusion Detection & Prevention Systems-Sourcefire Snort | |
Teymourlouei et al. | Effectiveness of real-time network monitoring for identifying hidden vulnerabilities inside a system | |
Tixteco et al. | Intrusion detection using Indicators of compromise based on best practices and windows event logs | |
Arafat Ali | A new model for monitoring intrusion based on Petri nets | |
Axelsson | Aspects of the modelling and performance of intrusion detection | |
Jaiswal et al. | Database intrusion prevention cum detection system with appropriate response | |
Nuangpookka | The Need for an Internally Developed Intrusion Detection System for Web Servers |