Computer security is an area of ever increasing importance. Our society relies on computerised services, which gives many reasons for computer criminals, attackers, terrorists, hackers, crackers, fraudsters, or whatever name is appropriate, to break these systems. To deal with security problems, many types of mechanisms have been developed. One mechanism is the intrusion detection system (IDS), designed to detect ongoing attacks, detect attacks after the fact or even detect preparations for an attack. The IDS is complementary to preventive security mechanisms, such as firewalls and authentication systems, which can never be made 100% secure. A similar type of system is the fraud detection system (FDS), specialised to detect frauds (or "atta...
The increasing popularity of network technology has brought convenience to human life.People have st...
There is a risk whenever we use networks, computer systems and Internet technologies that things wil...
The sheer number of different attack vectors and large amount of data produced by computer systems m...
Computer security is an area of ever increasing importance. Our society relies on computerised servi...
Log data adapted for intrusion detection is a little explored research issue despite its importance ...
Nowadays, the majority of corporations mainly use signature-based intrusion detection. This trend is...
Society of today is becoming increasingly dependent on the availability and correctness of IT-system...
Intrusion detection systems (IDSs) are capable of detecting both suspicious insider activity and att...
The quality of log data is vital to the intrusion detection process. At the same time, it is very mu...
The focus of this thesis is on data collection and in particular data collection for intrusion detec...
Abstract: Attacks on the computer infrastructures are becoming an increasingly serious problem. Ther...
A considerable effort has been recently devoted to the development of database management systems (D...
Most computerized information systems we use in our everyday lives provide very little protection ag...
Intrusion Detection Systems (IDS) tools are deployed within networks to monitor data that is transmi...
Nowaday, we use computers for everything from banking and investing to shopping and communicating wi...
The increasing popularity of network technology has brought convenience to human life.People have st...
There is a risk whenever we use networks, computer systems and Internet technologies that things wil...
The sheer number of different attack vectors and large amount of data produced by computer systems m...
Computer security is an area of ever increasing importance. Our society relies on computerised servi...
Log data adapted for intrusion detection is a little explored research issue despite its importance ...
Nowadays, the majority of corporations mainly use signature-based intrusion detection. This trend is...
Society of today is becoming increasingly dependent on the availability and correctness of IT-system...
Intrusion detection systems (IDSs) are capable of detecting both suspicious insider activity and att...
The quality of log data is vital to the intrusion detection process. At the same time, it is very mu...
The focus of this thesis is on data collection and in particular data collection for intrusion detec...
Abstract: Attacks on the computer infrastructures are becoming an increasingly serious problem. Ther...
A considerable effort has been recently devoted to the development of database management systems (D...
Most computerized information systems we use in our everyday lives provide very little protection ag...
Intrusion Detection Systems (IDS) tools are deployed within networks to monitor data that is transmi...
Nowaday, we use computers for everything from banking and investing to shopping and communicating wi...
The increasing popularity of network technology has brought convenience to human life.People have st...
There is a risk whenever we use networks, computer systems and Internet technologies that things wil...
The sheer number of different attack vectors and large amount of data produced by computer systems m...