Nothing Special   »   [go: up one dir, main page]

Pickering, 2002 - Google Patents

Evaluating the viability of intrusion detection system benchmarking

Pickering, 2002

View PDF
Document ID
6325881553768774005
Author
Pickering K
Publication year
Publication venue
Bachelor Thesis, University of Virginia, US

External Links

Snippet

I would like to thank Dr. David Evans, my Technical Advisor, for his support and advisory work during the course of this project, and Dr. Patricia Click for helping me keep this task managed properly, as well as the aid she provided as my TCC advisor with editing. I would …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies

Similar Documents

Publication Publication Date Title
Koziol Intrusion detection with Snort
US9942270B2 (en) Database deception in directory services
Joshi et al. Honeypots: a new paradigm to information security
Kendall A database of computer attacks for the evaluation of intrusion detection systems
US9769204B2 (en) Distributed system for Bot detection
Debar An introduction to intrusion-detection systems
US20030084322A1 (en) System and method of an OS-integrated intrusion detection and anti-virus system
Collins Network security through data analysis: From data to action
Sainis et al. Classification of various dataset for intrusion detection system
Al-Hammadi Behavioural correlation for malicious bot detection
Diebold et al. A honeypot architecture for detecting and analyzing unknown network attacks
Mai et al. J-Honeypot: a Java-based network deception tool with monitoring and intrusion detection
Pickering Evaluating the viability of intrusion detection system benchmarking
Lukatsky et al. Protect your information with intrusion detection
Arvidson et al. Intrusion Detection Systems: Technologies, Weaknesses and Trends
Monteiro How intrusion detection can improve software decoy applications
Helmer Intelligent multi-agent system for intrusion detection and countermeasures
Goebel Advanced Honeynet based Intrusion Detection
Cui Automating malware detection by inferring intent
Aarseth Identifying vulnerable services using non-intrusive techniques
Thakare et al. Computer attacks and intrusion detection system: A need review
Bove Using honeypots to detect and analyze attack patterns on cloud infrastructures
Verwoerd Active network security
Ye et al. Attack profiles to derive data observations, features, and characteristics of cyber attacks
Heikura Analyzing Offensive and Defensive Networking Tools in a Laboratory Environme