Pickering, 2002 - Google Patents
Evaluating the viability of intrusion detection system benchmarkingPickering, 2002
View PDF- Document ID
- 6325881553768774005
- Author
- Pickering K
- Publication year
- Publication venue
- Bachelor Thesis, University of Virginia, US
External Links
Snippet
I would like to thank Dr. David Evans, my Technical Advisor, for his support and advisory work during the course of this project, and Dr. Patricia Click for helping me keep this task managed properly, as well as the aid she provided as my TCC advisor with editing. I would …
- 238000001514 detection method 0 title abstract description 58
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Koziol | Intrusion detection with Snort | |
US9942270B2 (en) | Database deception in directory services | |
Joshi et al. | Honeypots: a new paradigm to information security | |
Kendall | A database of computer attacks for the evaluation of intrusion detection systems | |
US9769204B2 (en) | Distributed system for Bot detection | |
Debar | An introduction to intrusion-detection systems | |
US20030084322A1 (en) | System and method of an OS-integrated intrusion detection and anti-virus system | |
Collins | Network security through data analysis: From data to action | |
Sainis et al. | Classification of various dataset for intrusion detection system | |
Al-Hammadi | Behavioural correlation for malicious bot detection | |
Diebold et al. | A honeypot architecture for detecting and analyzing unknown network attacks | |
Mai et al. | J-Honeypot: a Java-based network deception tool with monitoring and intrusion detection | |
Pickering | Evaluating the viability of intrusion detection system benchmarking | |
Lukatsky et al. | Protect your information with intrusion detection | |
Arvidson et al. | Intrusion Detection Systems: Technologies, Weaknesses and Trends | |
Monteiro | How intrusion detection can improve software decoy applications | |
Helmer | Intelligent multi-agent system for intrusion detection and countermeasures | |
Goebel | Advanced Honeynet based Intrusion Detection | |
Cui | Automating malware detection by inferring intent | |
Aarseth | Identifying vulnerable services using non-intrusive techniques | |
Thakare et al. | Computer attacks and intrusion detection system: A need review | |
Bove | Using honeypots to detect and analyze attack patterns on cloud infrastructures | |
Verwoerd | Active network security | |
Ye et al. | Attack profiles to derive data observations, features, and characteristics of cyber attacks | |
Heikura | Analyzing Offensive and Defensive Networking Tools in a Laboratory Environme |