The Rule Based Intrusion Detection Model for User Behavior
暂无分享,去创建一个
In this paper we propose rule based intrusion detection for user behavior. The model periodically collect the log and BIDS detector to detect normal or abnormal activity.If activity is normal then message is generated and if the activity is abnormal then the rule engine checks rules for intrusion. The malicious activity also stored in database for future IDS. The rules are stored in the rule engine of the system.
[1] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[2] S. E. Smaha. Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.