{"title":"基于主机的入侵检测系统","authors":"L. Vokorokos, A. Baláz","doi":"10.1109/INES.2010.5483815","DOIUrl":null,"url":null,"abstract":"The paper presents intrusion detection system which informs system administrator about potential intrusion incidence in a system. The designed architecture employes statistical method of data evaluation, that allows detection based on the knowledge of user activity deviation in the computer system from learned profile representing standard user behavior.","PeriodicalId":118326,"journal":{"name":"2010 IEEE 14th International Conference on Intelligent Engineering Systems","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"50","resultStr":"{\"title\":\"Host-based intrusion detection system\",\"authors\":\"L. Vokorokos, A. Baláz\",\"doi\":\"10.1109/INES.2010.5483815\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper presents intrusion detection system which informs system administrator about potential intrusion incidence in a system. The designed architecture employes statistical method of data evaluation, that allows detection based on the knowledge of user activity deviation in the computer system from learned profile representing standard user behavior.\",\"PeriodicalId\":118326,\"journal\":{\"name\":\"2010 IEEE 14th International Conference on Intelligent Engineering Systems\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-05-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"50\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE 14th International Conference on Intelligent Engineering Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INES.2010.5483815\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE 14th International Conference on Intelligent Engineering Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INES.2010.5483815","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The paper presents intrusion detection system which informs system administrator about potential intrusion incidence in a system. The designed architecture employes statistical method of data evaluation, that allows detection based on the knowledge of user activity deviation in the computer system from learned profile representing standard user behavior.