入侵检测系统
计算机安全
计算机科学
审计
入侵
网络安全
业务
地球化学
会计
地质学
标识
DOI:10.1016/0167-4048(93)90029-5
摘要
Today's computer systems are vulnerable both to abuse by insiders and to penetration by outsiders, as evidenced by the growing number of incidents reported in the press. To close all security loopholes from today's systems is infeasible, and no combination of technologies can prevent legitimate users from abusing their authority in a system; thus auditing is viewed as the last line of defense. Over the past several years, the computer security community has been developing automated tools to analyze computer system audit data for suspicious user behavior. This paper describes the use of such tools for detecting computer system intrusion and describes further technologies that may be of use for intrusion detection in the future.
科研通智能强力驱动
Strongly Powered by AbleSci AI