Movatterモバイル変換


[0]ホーム

URL:


Jha et al., 2002 - Google Patents

Building agents for rule-based intrusion detection system

Jha et al., 2002

Document ID
12857372362812988934
Author
Jha S
Hassan M
Publication year
Publication venue
Computer Communications

External Links

Snippet

In this paper we describe the development and testing of an agent-based intrusion detection system for Linux platform. We take a dual-approach to intrusion detection: pre-emptory and reactionary. With the pre-emptory approach, a network-based agent is implemented to …
Continue reading atwww.sciencedirect.com (other versions)

Classifications

The classifications are assigned by a computer and are not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the classifications listed.
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

PublicationPublication DateTitle
Binde et al.Assessing outbound traffic to uncover advanced persistent threat
US9942270B2 (en)Database deception in directory services
Caswell et al.Snort intrusion detection and prevention toolkit
US9769204B2 (en)Distributed system for Bot detection
US20190020667A1 (en)Non-rule based security risk detection
AlbinA comparative analysis of the snort and suricata intrusion-detection systems
Kurundkar et al.Network intrusion detection using Snort
Kazienko et al.Intrusion Detection Systems (IDS) Part I-(network intrusions; attack symptoms; IDS tasks; and IDS architecture)
Hiesgen et al.The Log4j incident: a comprehensive measurement study of a critical vulnerability
SrivatsaDetecting and preventing attacks using network intrusion detection systems
Jha et al.Building agents for rule-based intrusion detection system
Sayyed et al.Intrusion detection system
Mai et al.J-Honeypot: a Java-based network deception tool with monitoring and intrusion detection
Adiwal et al.Intrusion Detection and Prevention in OpenStack: A Case Study on Enhancing Security and Threat Detection
Resmi et al.Intrusion detection system techniques and tools: A survey
Sommestad et al.A test of intrusion alert filtering based on network information
Iheagwara et al.Evaluation of the performance of id systems in a switched and distributed environment: the realsecure case study
Navin et al.A survey on intrusion detection system
Ramakrishnan et al.Pandora: An IOT based Intrusion Detection Honeypot with Real-time Monitoring
Fanfara et al.Autonomous hybrid honeypot as the future of distributed computer systems security
VerwoerdActive network security
Kaur et al.Intrusion detection system using honeypots and swarm intelligence
Karthikeyan et al.NETWORK INTRUSION DETECTION SYSTEM BASED ON PACKET FILTERS.
LarsenSlow port scanning with bro
Mukhopadhyay et al.HawkEye solutions: a network intrusion detection system

[8]
ページ先頭

©2009-2025 Movatter.jp