English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4238027      Online Users : 433
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/22043


    Title: A host-based real-time intrusion detection system with data mining and forensic techniques??
    Authors: Leu, F.-Y., Yang, T.-Y.
    Contributors: Department of Computer Science, Tunghai University
    Keywords: Data Mining;Forensic Techniques;Host based;Intelligent Monitor;Intrusion Detection System;Profile
    Date: 2003-10-14
    Issue Date: 2013-05-15T09:09:44Z (UTC)
    Publisher: Taipei; Taiwan
    Abstract: Host-based detective methods play an important role in developing an Intrusion Detection System (IDS). One of the major concerns of the development is its latency delay. Host-based IDS systems inspecting log files provided by operating systems or applications need more time to analyze log content. It demands a large number of computer resources, such as CPU time and memory. Besides, there still a crucial problem about how to transform human behavior into numbers so as measurement can be easily performed. In order to improve the problem addressed we promote an IDS called Host-Based Real Time Intrusion Detection System (HRIDS). HRIDS monitors users' activities in a real-time aspect. By defining user profiles, we can easily find out the anomalies and malicious accesses instantly. With the help of user profiles, we can not only find which account has been misused, but also realize the true intruders. There is no need to update the knowledge databases of HRIDS. It is a self-organized and self-training system. Furthermore, we can discover cooperative attacks submitted by users at the same time by using data mining and forensic techniques.
    Relation: IEEE Annual International Carnahan Conference on Security Technology, Proceedings , pp. 580-586
    Appears in Collections:[資訊工程學系所] 會議論文

    Files in This Item:

    File SizeFormat
    index.html0KbHTML177View/Open


    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback