冒名顶替者异常检测

A. Tazerouti, A. Ikram
{"title":"冒名顶替者异常检测","authors":"A. Tazerouti, A. Ikram","doi":"10.4314/JFAS.V13I1.14","DOIUrl":null,"url":null,"abstract":"Over the last two decades the world of cyber security has grown immensely, but despite the state-of-the-art security detection systems and intrusion detection systems (IDSs), unwanted malicious users still find their way around these security measures and gain access to secure systems. This study consists of shedding some light on the security issues in the intrusion detection systems, their vulnerabilities and drawbacks. A hypothesis is proposed to help mitigate these issues and obtain a fast and a more precise method for the detection of different malicious intruders and imposters, study their behavior and make a statistical comparison of data from the used IDSs and throughout the process. This study will state the current available technologies of IDSs, site their challenges and implement a new software-based methodology to increase the detection and reduce false alarm rates for the IDS.","PeriodicalId":15885,"journal":{"name":"Journal of Fundamental and Applied Sciences","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Imposters anomaly detection\",\"authors\":\"A. Tazerouti, A. Ikram\",\"doi\":\"10.4314/JFAS.V13I1.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Over the last two decades the world of cyber security has grown immensely, but despite the state-of-the-art security detection systems and intrusion detection systems (IDSs), unwanted malicious users still find their way around these security measures and gain access to secure systems. This study consists of shedding some light on the security issues in the intrusion detection systems, their vulnerabilities and drawbacks. A hypothesis is proposed to help mitigate these issues and obtain a fast and a more precise method for the detection of different malicious intruders and imposters, study their behavior and make a statistical comparison of data from the used IDSs and throughout the process. This study will state the current available technologies of IDSs, site their challenges and implement a new software-based methodology to increase the detection and reduce false alarm rates for the IDS.\",\"PeriodicalId\":15885,\"journal\":{\"name\":\"Journal of Fundamental and Applied Sciences\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Fundamental and Applied Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4314/JFAS.V13I1.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Fundamental and Applied Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4314/JFAS.V13I1.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在过去的二十年里,网络安全领域取得了巨大的发展,但尽管有最先进的安全检测系统和入侵检测系统(IDS),不受欢迎的恶意用户仍然可以绕过这些安全措施,访问安全系统。本研究旨在揭示入侵检测系统中的安全问题及其漏洞和缺点。提出了一个假设,以帮助缓解这些问题,并获得一种快速、更精确的方法来检测不同的恶意入侵者和冒名顶替者,研究他们的行为,并对所使用的IDS和整个过程中的数据进行统计比较。本研究将阐述IDS的当前可用技术,定位其挑战,并实施一种新的基于软件的方法,以提高IDS的检测能力并降低误报率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Imposters anomaly detection
Over the last two decades the world of cyber security has grown immensely, but despite the state-of-the-art security detection systems and intrusion detection systems (IDSs), unwanted malicious users still find their way around these security measures and gain access to secure systems. This study consists of shedding some light on the security issues in the intrusion detection systems, their vulnerabilities and drawbacks. A hypothesis is proposed to help mitigate these issues and obtain a fast and a more precise method for the detection of different malicious intruders and imposters, study their behavior and make a statistical comparison of data from the used IDSs and throughout the process. This study will state the current available technologies of IDSs, site their challenges and implement a new software-based methodology to increase the detection and reduce false alarm rates for the IDS.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
审稿时长
16 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信