Misuse detection

Misuse detection actively works against potential insider threats to vulnerable computer data.
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
Intrusions detection systems (IDSs) are systems that try to detect attacks as they occur or after the attacks took place. IDSs… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
In this paper, we propose a novel Intrusion Detection System (IDS) architecture utilizing both anomaly and misuse detection… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A large set of machine learning and pattern classification algorithms trained and tested on KDD intrusion detection data set… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
A small subset of machine learning algorithms, mostly inductive learning based, applied to the KDD 1999 Cup intrusion detection… (More)
  • table 1
  • figure 1
  • table 2
Is this relevant?
Highly Cited
2002
Highly Cited
2002
are becoming a major concern. Our nation’s infrastructure is heavily network based in all industries. However, the nation’s… (More)
  • figure 2
  • figure 4
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Despite the necessity of protecting information stored in database systems (DBS), existing security models are insu cient to… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1999
Highly Cited
1999
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
1999
Highly Cited
1999
This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it… (More)
  • figure 1
  • figure 3
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
Current intrusion detection systems lack the ability to generalize from previously observed attacks to detect even slight… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Misuse detection is the process of attempting to identify instances of network attacks by comparing current activity against the… (More)
  • table 1
  • table 3
  • figure 3
Is this relevant?