{"title":"IDA-intrusion detection alert","authors":"Karen L. Petersen","doi":"10.1109/CMPSAC.1992.217586","DOIUrl":null,"url":null,"abstract":"The author provides an overview of the IDA (intrusion detection alert) knowledge-based system project. This project involves the development of a prototype knowledge based system to analyze mainframe security audit trail data. Various aspects of the IDA knowledge-based system prototyping effort, including project management, design, and development are discussed. Highlights of IDA features are described. The use of knowledge based system technology to address the increased importance of securing corporate data and information systems, a critical and valuable company asset, is the primary focus.<<ETX>>","PeriodicalId":286518,"journal":{"name":"[1992] Proceedings. The Sixteenth Annual International Computer Software and Applications Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1992] Proceedings. The Sixteenth Annual International Computer Software and Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMPSAC.1992.217586","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The author provides an overview of the IDA (intrusion detection alert) knowledge-based system project. This project involves the development of a prototype knowledge based system to analyze mainframe security audit trail data. Various aspects of the IDA knowledge-based system prototyping effort, including project management, design, and development are discussed. Highlights of IDA features are described. The use of knowledge based system technology to address the increased importance of securing corporate data and information systems, a critical and valuable company asset, is the primary focus.<>