Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shieh, SP | en_US |
dc.contributor.author | Gligor, VD | en_US |
dc.date.accessioned | 2014-12-08T15:01:37Z | - |
dc.date.available | 2014-12-08T15:01:37Z | - |
dc.date.issued | 1997-07-01 | en_US |
dc.identifier.issn | 1041-4347 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1109/69.617059 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/444 | - |
dc.description.abstract | Operational security problems, which are often the result of access authorization misuse, can lead to intrusion in secure computer systems. We motivate the need for pattern-oriented intrusion detection, and present a model that tracks both data and privilege flows within secure systems to detect context-dependent intrusions caused by operational security problems. The model allows the uniform representation of various types of intrusion patterns, such as those caused by unintended use of foreign programs and input data, imprudent choice of default privileges, and use of weak protection mechanisms. As with all pattern-oriented models, this model cannot be used to detect new, unanticipated intrusion patterns that could be detected by statistical models. For this reason, we expect that this model will complement, not replace, statistical models for intrusion detection. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | access misuse | en_US |
dc.subject | audit analysis | en_US |
dc.subject | context-dependent intrusion | en_US |
dc.subject | intrusion detection | en_US |
dc.subject | operational security problems | en_US |
dc.subject | statistical methods | en_US |
dc.subject | rule-based methods | en_US |
dc.subject | secure systems | en_US |
dc.title | On a pattern-oriented model for intrusion detection | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/69.617059 | en_US |
dc.identifier.journal | IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING | en_US |
dc.citation.volume | 9 | en_US |
dc.citation.issue | 4 | en_US |
dc.citation.spage | 661 | en_US |
dc.citation.epage | 667 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:A1997XW22000013 | - |
dc.citation.woscount | 34 | - |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.