2004
DOI: 10.1108/09685220410518810
|View full text |Cite
|
Sign up to set email alerts
|

A new two‐tiered strategy to intrusion detection

Abstract: Researchers have used many techniques in designing intrusion detection systems (IDS) and yet we still do not have an effective IDS. The interest in this work is to combine techniques of data mining and expert systems in designing an effective anomaly-based IDS. Combining methods may give better coverage, and make the detection more effective. The idea is to mine system audit data for consistent and useful patterns of user behaviour, and then keep these normal behaviours in profiles. An expert system is used as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2005
2005
2016
2016

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…The three security goals of computer system are Confidentiality, Integrity and Availability. These goals are commonly referred as the CIA of computer security (Sodiya, Longe, & Akinwale, 2004) and these goals also apply to computer systems.…”
Section: Software Security Goalsmentioning
confidence: 99%
“…The three security goals of computer system are Confidentiality, Integrity and Availability. These goals are commonly referred as the CIA of computer security (Sodiya, Longe, & Akinwale, 2004) and these goals also apply to computer systems.…”
Section: Software Security Goalsmentioning
confidence: 99%
“…Intrusion detection systems (IDSs) are security tools that are used to detect traces of malicious activities which are targeted against networks and their resources (Toth and Kruegel, 2002). According to Sodiya et al (2004), intrusion detection systems are systems that detect internal and external attack on computer systems and undertake some measures to eliminate them. An Intrusion Detection System (IDS) does not only helps the administrators to detect intrusions and limit damages, but also helps to identify the source of attacks, which sometimes acts as a deterrent, especially in case of insider attacks (Wang et al, 2006).…”
Section: Introductionmentioning
confidence: 99%
“…These goals are commonly referred as the CIA of computer security (Sodiya, Longe, & Akinwale, 2004) and these goals also apply to computer systems.…”
Section: Software Security Goalsmentioning
confidence: 99%