2010 IEEE 14th International Conference on Intelligent Engineering Systems 2010
DOI: 10.1109/ines.2010.5483815
|View full text |Cite
|
Sign up to set email alerts
|

Host-based intrusion detection system

Abstract: The paper presents intrusion detection system which informs system administrator about potential intrusion incidence in a system. The designed architecture employes statistical method of data evaluation, that allows detection based on the knowledge of user activity deviation in the computer system from learned profile representing standard user behavior.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(12 citation statements)
references
References 4 publications
(2 reference statements)
0
11
0
Order By: Relevance
“…To solve this problem, users can use a method that allows installing only authenticated software. W. Enck [8] is proposing to apply the technology in the field of Kirin Security Requirement Engineering in the smart phone's OS. This approach generates a Security Rule in each application before deployment.…”
Section: Security Application Management Research Through Certificationmentioning
confidence: 99%
See 1 more Smart Citation
“…To solve this problem, users can use a method that allows installing only authenticated software. W. Enck [8] is proposing to apply the technology in the field of Kirin Security Requirement Engineering in the smart phone's OS. This approach generates a Security Rule in each application before deployment.…”
Section: Security Application Management Research Through Certificationmentioning
confidence: 99%
“…It works as an agent conducting surveillance of anything that bypasses the security policy of the OS. [8] …”
Section: Host-based Intrusion Detection System Hidsmentioning
confidence: 99%
“…Intrusion detection systems for grid can be based on host, network, data, knowledge and behavior. Host-based Intrusion Detection System(HIDS) [12] consists of an agent that identifies intrusions by analyzing activities on the host and its current state. An adapted version of this system will be used in our detection algorithm.…”
Section: B Intrusion Detectionmentioning
confidence: 99%
“…In [27], Vokorokos & Balaz presented an intrusion detection system which informs the system administrator about potential intrusion incidence in a system. This designed architecture employs statistical method of data evaluation, that allows detection based on the knowledge of user activity deviation in the computer system from learned profile representing standard user behavior.…”
Section: Pgnids (Pattern-graph Based Network Intrusion Detectionmentioning
confidence: 99%