Subir material

Suba sus trabajos a SEDICI, para mejorar notoriamente su visibilidad e impacto

 

Mostrar el registro sencillo del ítem

dc.date.accessioned 2012-09-21T12:58:56Z
dc.date.available 2012-09-21T12:58:56Z
dc.date.issued 2004
dc.identifier.uri http://sedici.unlp.edu.ar/handle/10915/21311
dc.description.abstract In todays world where nearly every company is dependent on the Internet to survive, it is not surprising that the role of intrusion detection has become extremely important within the last decade. Intrusion detection involves determining whether some entity has attempted to gain, or worse, it has gained unauthorized access to the system. The task of current intrusion detection systems is detect possible threats not only from insiders but also from outsiders. Based on our current knowledge, there are two things the system administrator could do in order to keep secure his system. First, use preventive measures. Second, make use of the audit logs. Due to the sheer volume of the logs, it is required that this task be performed automat- ically. Data Mining eld of study has help to partially automatize this process. However, the current state of art has still left too much to the administrator and sometimes it distract the administrator raising false alarms. This work propose to apply a new technique, successfully used in others elds of knowledge as Bioinformatics and Classi cation Systems, in order to de ne more accurately user's pro les and to detect more intruders, raising a lower number of false alarms and having a precision higher than other techniques. en
dc.format.extent 546-551 es
dc.language en es
dc.subject system security en
dc.subject Patterns es
dc.subject Security es
dc.subject pattern mining en
dc.subject emerging patterns en
dc.subject Software Architectures es
dc.subject jumping emerging patterns en
dc.title Strengthening intrusion detection techniques through emerging patterns en
dc.type Objeto de conferencia es
sedici.creator.person Grandinetti, Walter M. es
sedici.description.note Eje: Redes y arquitecturas es
sedici.subject.materias Ciencias Informáticas es
sedici.description.fulltext true es
mods.originInfo.place Red de Universidades con Carreras en Informática (RedUNCI) es
sedici.subtype Objeto de conferencia es
sedici.rights.license Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)
sedici.rights.uri http://creativecommons.org/licenses/by-nc-sa/2.5/ar/
sedici.date.exposure 2004-05
sedici.relation.event VI Workshop de Investigadores en Ciencias de la Computación es
sedici.description.peerReview peer-review es


Descargar archivos

Este ítem aparece en la(s) siguiente(s) colección(ones)

Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5) Excepto donde se diga explícitamente, este item se publica bajo la siguiente licencia Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)