Labib, 2004 - Google Patents
Computer security and intrusion detectionLabib, 2004
- Document ID
- 3424013356341211849
- Author
- Labib K
- Publication year
- Publication venue
- XRDS: Crossroads, The ACM Magazine for Students
External Links
Snippet
Computer attacks are now commonplace. By connecting your computer to the Internet, you increase the risk of having someone break in, install malicious programs and tools on it, and possibly use it to attack other machines on the Internet by controlling it remotely. Several …
- 238000001514 detection method 0 title abstract description 35
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ghorbani et al. | Network intrusion detection and prevention: concepts and techniques | |
| Ning et al. | Analyzing intensive intrusion alerts via correlation | |
| Allen et al. | State of the practice of intrusion detection technologies | |
| McHugh | Intrusion and intrusion detection | |
| Norouzian et al. | Classifying attacks in a network intrusion detection system based on artificial neural networks | |
| Kim et al. | DSS for computer security incident response applying CBR and collaborative response | |
| Labib | Computer security and intrusion detection | |
| Ádám et al. | Artificial neural network based IDS | |
| Tsai et al. | Intrusion detection: a machine learning approach | |
| Beigh et al. | Intrusion Detection and Prevention System: Classification and Quick | |
| Argauer et al. | VTAC: Virtual terrain assisted impact assessment for cyber attacks | |
| Bhardwaj et al. | Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment | |
| Prayote | Knowledge based anomaly detection | |
| Baazeem | Cybersecurity: BotNet Threat Detection Across the Seven-Layer ISO-OSI Model Using Machine Learning Techniques | |
| Marinova-Boncheva | Applying a data mining method for intrusion detection | |
| Arvidson et al. | Intrusion Detection Systems: Technologies, Weaknesses and Trends | |
| Pierre et al. | Hybrid machine learning mechanism for intrusion detection systems in network security | |
| Al-Sadhan | Detecting Distributed Denial of Service Attacks in IPV6 by Using Artificial Intelligence Techniques | |
| Mahfouz | Towards a Holistic Efficient Stacking Ensemble Intrusion Detection System Using Newly Generated Heterogeneous Datasets | |
| Nalavade et al. | Intrusion prevention systems: data mining approach | |
| Pranav et al. | Intrusion Detection System: Datasets, Threats, and Taxonomy | |
| Nuangpookka | The Need for an Internally Developed Intrusion Detection System for Web Servers | |
| Gnatyuk et al. | Cloud-Based Cyber Incidents Response System | |
| Allen | Analysis, detection, and modeling of attacks in computer communication networks | |
| Gates | The modeling and detection of distributed port scans: a thesis proposal |