DocumentCode :
2219596
Title :
Detecting and mitigating security anomalies
Author :
Vouk, M.
Author_Institution :
North Carolina State Univ., Raleigh, NC, USA
fYear :
2004
fDate :
15-17 Nov. 2004
Firstpage :
4
Abstract :
Summary form only given. Network and information security is of increasing concern as intruders utilize more advanced technologies, and attacks are occurring much more frequently. A simple intrusion can cause an enterprise financial disaster, a threat to national safety, or loss of human life. Network-based and computer-based intrusion detection systems (IDS´s) started appearing some twenty years ago. Now, there are various synchronous and asynchronous tools for external and internal network and host intrusion detection and mitigation using models ranging from signature scanning and pattern matching, to statistical anomaly detection. Although modern tools are much more advanced, they still have many limitations, shortcomings, and open issues. Most tend to be focused on matching known patterns as opposed to discovery of new anomalies through, for example, inductive reasoning about potential anomaly signals. This talk discusses the issues, and the place of pro-active reasoning in the context of identification of security-related anomalies and issues.
Keywords :
inference mechanisms; pattern matching; security of data; computer-based intrusion detection system; information security; network security; pattern matching; pro-active reasoning; signature scanning; statistical anomaly detection; Artificial intelligence; Computer networks; Humans; Information security; Intrusion detection; National security; Pattern matching; Safety;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Tools with Artificial Intelligence, 2004. ICTAI 2004. 16th IEEE International Conference on
Conference_Location :
Boca Raton, FL, USA
ISSN :
1082-3409
Print_ISBN :
0-7695-2236-X
Type :
conf
DOI :
10.1109/ICTAI.2004.49
Filename :
1374163
Link To Document :
بازگشت