2015
DOI: 10.1007/s11227-015-1506-9
|View full text |Cite
|
Sign up to set email alerts
|

Host-based intrusion detection system for secure human-centric computing

Abstract: With the advancement of information communication technology, people can access many useful services for human-centric computing. Although this advancement increases work efficiency and provides greater convenience to people, advanced security threats such as the Advanced Persistent Threat (APT) attack have been continuously increasing. Technical measures for protecting against an APT attack are desperately needed because APT attacks, such as the 3.20 Cyber Terror and SK Communications hacking incident, have o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(22 citation statements)
references
References 13 publications
0
22
0
Order By: Relevance
“…A myriad of applications and technology resources exist that focus particularly on the continuous dissemination of information to users. These technological advancements provide users with convenience and offer corporations high-level business efficiency ( Moon et al, 2015 ). However, not all information is presented in layman terms.…”
Section: Usagementioning
confidence: 99%
See 1 more Smart Citation
“…A myriad of applications and technology resources exist that focus particularly on the continuous dissemination of information to users. These technological advancements provide users with convenience and offer corporations high-level business efficiency ( Moon et al, 2015 ). However, not all information is presented in layman terms.…”
Section: Usagementioning
confidence: 99%
“…This is possible because the computing environments are connected to networks everywhere. However, the important information available in these environments may equally always be vulnerable to malicious intrusion ( Moon et al, 2015 ). To cope with cyber attacks, companies use network security equipment such as firewalls, intrusion detection systems, intrusion prevention systems, and security technologies such as antivirus software and data-loss protection.…”
Section: Usagementioning
confidence: 99%
“…This model warns users of malicious activities found in the environment by tracking and analyzing system calls. Moon et al 43 proposed a malware detection method based on process behavior information. By collecting the characteristic parameter values of the process ID, the frequency of occurrence of each characteristic parameter was analyzed, and malware was classified based on the frequency information.…”
Section: Related Workmentioning
confidence: 99%
“…It has higher approximation ability, and its continuity is the best. When the control factor µ increases or decreases, the curve of the new threshold function becomes steeper and smooth [3,13].…”
Section: 1mentioning
confidence: 99%