+

Labib, 2004 - Google Patents

Computer security and intrusion detection

Labib, 2004

Document ID
3424013356341211849
Author
Labib K
Publication year
Publication venue
XRDS: Crossroads, The ACM Magazine for Students

External Links

Snippet

Computer attacks are now commonplace. By connecting your computer to the Internet, you increase the risk of having someone break in, install malicious programs and tools on it, and possibly use it to attack other machines on the Internet by controlling it remotely. Several …
Continue reading at dl.acm.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
Ghorbani et al. Network intrusion detection and prevention: concepts and techniques
Ning et al. Analyzing intensive intrusion alerts via correlation
Allen et al. State of the practice of intrusion detection technologies
McHugh Intrusion and intrusion detection
Norouzian et al. Classifying attacks in a network intrusion detection system based on artificial neural networks
Kim et al. DSS for computer security incident response applying CBR and collaborative response
Labib Computer security and intrusion detection
Ádám et al. Artificial neural network based IDS
Tsai et al. Intrusion detection: a machine learning approach
Beigh et al. Intrusion Detection and Prevention System: Classification and Quick
Argauer et al. VTAC: Virtual terrain assisted impact assessment for cyber attacks
Bhardwaj et al. Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment
Prayote Knowledge based anomaly detection
Baazeem Cybersecurity: BotNet Threat Detection Across the Seven-Layer ISO-OSI Model Using Machine Learning Techniques
Marinova-Boncheva Applying a data mining method for intrusion detection
Arvidson et al. Intrusion Detection Systems: Technologies, Weaknesses and Trends
Pierre et al. Hybrid machine learning mechanism for intrusion detection systems in network security
Al-Sadhan Detecting Distributed Denial of Service Attacks in IPV6 by Using Artificial Intelligence Techniques
Mahfouz Towards a Holistic Efficient Stacking Ensemble Intrusion Detection System Using Newly Generated Heterogeneous Datasets
Nalavade et al. Intrusion prevention systems: data mining approach
Pranav et al. Intrusion Detection System: Datasets, Threats, and Taxonomy
Nuangpookka The Need for an Internally Developed Intrusion Detection System for Web Servers
Gnatyuk et al. Cloud-Based Cyber Incidents Response System
Allen Analysis, detection, and modeling of attacks in computer communication networks
Gates The modeling and detection of distributed port scans: a thesis proposal
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载