Threat Detection Systems
نویسنده
چکیده
1
منابع مشابه
Multiple Simultaneous Threat Detection in UNIX Environment
Although UNIX is considered a very stable and secure platform, the development of Intrusion Detection Systems (IDS) is essential as current and future generations of hackers are continuously attempting to undermine its integrity. The empirical experiment of multiple simultaneous threat detection system proved that use of hybrid data fusion model of Bayesian, Dempster Shafer and extended Dempste...
متن کاملVulnerability-Focused Threat Detection: Protect Against the Unknown
Vulnerabilities and threats are being discovered at a pace that traditional exploit-based attack detection technology cannot meet. Vulnerability-focused detection technologies provide the solution to this problem with broader threat detection, fewer signatures, and day-zero detection capabilities. This paper describes the difference between exploitfocused and vulnerability-focused detection and...
متن کاملVulnerability-Focused Threat Detection: Protect Against the Unknown
Vulnerabilities and threats are being discovered at a pace that traditional exploit-based attack detection technology cannot meet. Vulnerability-focused detection technologies provide the solution to this problem with broader threat detection, fewer signatures, and day-zero detection capabilities. This paper describes the difference between exploitfocused and vulnerability-focused detection and...
متن کاملGeneralized Evidential Processing in Multiple Simultaneous Threat Detection in UNIX
In this paper, a hybrid identity fusion model at decision level is proposed for Simultaneous Threat Detection Systems. The hybrid model is comprised of mathematical and statistical data fusion engines; Dempster Shafer, Extended Dempster and Generalized Evidential Processing (GEP). Simultaneous Threat Detection Systems improve threat detection rate by 39%. In terms of efficiency and performance,...
متن کاملThe Threat Detection System THAT CRIED WOLF: Reconciling Developers with Operators
The Department of Defense and Department of Homeland Security use many threat detection systems, such as air cargo screeners and counter-improvised-explosive-device systems. Threat detection systems that perform well during testing are not always well received by the system operators, however. Some systems may frequently “cry wolf,” generating false alarms when true threats are not present. As ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010