[go: up one dir, main page]

Smaha et al., 2018 - Google Patents

Software Tools for Detecting Misuse on Unix Systems

Smaha et al., 2018

View PDF
Document ID
17879048184775358059
Author
Smaha S
Winslow J
Publication year
Publication venue
Handbook of Heterogeneous Networking

External Links

Snippet

Experience has shown that most computer misuse is perpetrated by authorized insiders, and it may be difficult to prevent abuse of assigned privilege. In addition, increased network connectivity over the Internet and other national networks greatly magnifies the risk of …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
CN114978584B (en) Network security protection security method and system based on unit units
US7398389B2 (en) Kernel-based network security infrastructure
US6405318B1 (en) Intrusion detection system
Miloslavskaya Security operations centers for information security incident management
EP2577545A2 (en) Security threat detection associated with security events and an actor category model
Marinova-Boncheva A short survey of intrusion detection systems
WO2011149773A2 (en) Security threat detection associated with security events and an actor category model
Bishop et al. The threat from the net [Internet security]
Beigh et al. Intrusion detection and prevention system: issues and challenges
Vasudeo et al. IMMIX-intrusion detection and prevention system
Nallaperumal CyberSecurity Analytics to Combat Cyber Crimes
Furnell et al. A conceptual architecture for real‐time intrusion monitoring
Jouini et al. Threats classification: state of the art
EP1378813A2 (en) Security policy enforcement systems
Raut Log based intrusion detection system
Badea et al. Computer networks security based on the detection of user's behavior
Smaha et al. Software Tools for Detecting Misuse on Unix Systems
LaPadula State of the art in anomaly detection and reaction
Vuppala et al. Intrusion Detection & Prevention Systems-Sourcefire Snort
Teymourlouei et al. Effectiveness of real-time network monitoring for identifying hidden vulnerabilities inside a system
Tixteco et al. Intrusion detection using Indicators of compromise based on best practices and windows event logs
Arafat Ali A new model for monitoring intrusion based on Petri nets
Axelsson Aspects of the modelling and performance of intrusion detection
Jaiswal et al. Database intrusion prevention cum detection system with appropriate response
Nuangpookka The Need for an Internally Developed Intrusion Detection System for Web Servers