Security

Anomaly and Misuse Intrusions Variability Detection

Free registration required

Executive Summary

In this paper, the authors discuss their research in developing intrusion detection software framework for modeling, simulation and detection computer system intrusion based on partially ordered events and patterns - FEIIDS. The paper describes problematic of intrusion detection systems and intrusions detection. They provide concrete design of developed framework based on intrusion signatures - threats are matched through Petri Nets that classify monitored system behavior and determine intrusion of monitored computer system. As network-based computer systems play increasingly vital roles in modern society, they have become the targets of their enemies and criminals.

  • Format: PDF
  • Size: 593.4 KB