Provided by:
Reed Elsevier
Topic:
Security
Format:
PDF
"Now-a-days intrusions become more increased in individual systems, so activities in a system must be observed by scanning and it must be saved for future use. If any discrepancy is found from observed behavior then a report must be generated to help red teams. The central idea of the authors' system lies in that it works as a supplement to already existing Intrusion Detection Systems (IDS). This is achieved by constantly monitoring the files and folders of system and system32 folders."