Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Detection Through Dynamic Software Measurement

The thrust of this paper is to present a new real-time approach to detect aberrant modes of system behavior induced by abnormal and unauthorized system activities. The theoretical foundation for the research program is based on the study of the software internal behavior. As a software system is executing, it will express a set of its many functionalities as sequential events. Each of these fun...

متن کامل

A Dynamic Intrusion-Detection Methodology

The present invention is a new real-time approach to detect aberrant modes of system behavior induced by abnormal and unauthorized system activities. This detection methodology is novel in that it is based on behavioral information obtained from a suitably instrumented computer program as it is executing. The theoretical foundation for the present invention is based on the study of the software...

متن کامل

Plan Recognition in Intrusion Detection Systems

To be effective, current intrusion detection systems (IDSs) must incorporate artificial intelligence methods for plan recognition. Plan recognition is critical both to predicting the future actions of attackers and planning appropriate responses to their actions. However network security places a new set of requirements on plan recognition. In this paper we present an argument for including pla...

متن کامل

Understanding Intrusion Detection Through Visualization

With the ever increasing use of computers for critical systems, computer security, the protection of data and computer systems from intentional, malicious intervention, is attracting much attention. Among the methods for defence, intrusion detection, i.e. the application of a tool to help the operator identify ongoing or already perpetrated attacks has been the subject of considerable research ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers & Security

سال: 2018

ISSN: 0167-4048

DOI: 10.1016/j.cose.2017.12.003