Design and Implementation of Secure Xenix
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
RULE BASED ANALYSIS OF COMPUTER SECURITY
RULE BASED ANALYSIS OF COMPUTER SECURITY
Recovery from Malicious Transactions
IEEE Transactions on Knowledge and Data Engineering
Information Model for Policy-Based Network Security Management
ICOIN '02 Revised Papers from the International Conference on Information Networking, Wireless Communications Technologies and Network Applications-Part I
Intrusion Detection through Behavioral Data
IDA '99 Proceedings of the Third International Symposium on Advances in Intelligent Data Analysis
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Protecting network users in mobile code systems
Journal of Parallel and Distributed Computing
Real-time data attack isolation for commercial database applications
Journal of Network and Computer Applications
Analysis of an Intelligent Agent Intrusion Response System
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Building intrusion pattern miner for Snort network intrusion detection system
Journal of Systems and Software
Identity verification through dynamic keystroke analysis
Intelligent Data Analysis
A NetFlow based flow analysis and monitoring system in enterprise networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A real-time intrusion prevention system for commercial enterprise databases and file systems
AIKED'05 Proceedings of the 4th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering Data Bases
A real-time intrusion prevention system for commercial enterprise databases
SEPADS'05 Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems
A real-time intrusion prevention system for commercial enterprise databases and file systems
MMACTEE'08 Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
Network-Based Anomaly Intrusion Detection Improvement by Bayesian Network and Indirect Relation
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
Weak signal estimation in chaotic clutter using model-based coupled synchronization
IEEE Transactions on Circuits and Systems Part I: Regular Papers
Improvement of anomaly intrusion detection performance by indirect relation for FTP service
IWANN'07 Proceedings of the 9th international work conference on Artificial neural networks
Signal estimation in clutter using SVM-based chaos synchronization
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Damage assessment and repair in attack resilient distributed database systems
Computer Standards & Interfaces
A dead-lock free self-healing algorithm for distributed transactional processes
ICISS'06 Proceedings of the Second international conference on Information Systems Security
User-Assisted host-based detection of outbound malware traffic
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Malware characteristics and threats on the internet ecosystem
Journal of Systems and Software
International Journal of Information Management: The Journal for Information Professionals
Divided two-part adaptive intrusion detection system
Wireless Networks
Hi-index | 0.00 |
Operational security problems, which are often the result of access authorization misuse, can lead to intrusion in secure computer systems. We motivate the need for pattern-oriented intrusion detection, and present a model that tracks both data and privilege flows within secure systems to detect context-dependent intrusions caused by operational security problems. The model allows the uniform representation of various types of intrusion patterns, such as those caused by unintended use of foreign programs and input data, imprudent choice of default privileges, and use of weak protection mechanisms. As with all pattern-oriented models, this model cannot be used to detect new, unanticipated intrusion patterns that could be detected by statistical models. For this reason, we expect that this model will complement, not replace, statistical models for intrusion detection.