Paper Title:
Research on Dynamic Intrusion Detection Model Based on Risk Coefficient
  Abstract

Intrusion detection technology is a kind of network security technology that can protect system from attacks. Based on the definition of system call risk coefficient, the paper brought out a system risk coefficient based dynamic intrusion detection model. Using the model, the drawbacks of traditional intrusion detection method based on system call was solved, which speeds up detection process and decreased false rate and error rate. It can also effectively identify error operations or users. The experiment result also proves the effectiveness and efficiency of the method.

  Info
Periodical
Advanced Materials Research (Volumes 129-131)
Edited by
Xie Yi and Li Mi
Pages
124-127
DOI
10.4028/www.scientific.net/AMR.129-131.124
Citation
Z. Wei, J. Y. Hou, H. Tan, G. N. Guo, "Research on Dynamic Intrusion Detection Model Based on Risk Coefficient", Advanced Materials Research, Vols. 129-131, pp. 124-127, 2010
Online since
August 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Dong Liang Wang, Zhi Gang Wang
Abstract:To improve detection accuracy, Utilizing HMM (Hidden Markov model) and BW to building model, the detection accuracy improves greatly. First,...
609
Authors: Chong Wang, Guang Jun Song, Chun Lan Zhao
Chapter 5: Control Science
Abstract:Considering the efficiency problem of software vulnerability discovering in Linux system, a new software vulnerability discovering in Linux...
537
Authors: Dan Nie, Yu Hui Wang
Chapter 6: Communication and Network
Abstract:The intended data-flow in a vulnerable program is subject to be subverted by attacks which exploit buffer overflows or format string...
1101
Authors: Jian Fei Tu
Chapter 1: Engineering Design. Theory and Practice
Abstract:Detailed and intact customer material, and fast and prompt response to customer call via mobile phone, telephone and other methods are two...
682
Authors: Rui Hao, Xin Guang Peng, Lei Xiu
Chapter 12: Applications of Information Technology and Computer in Industry
Abstract:For the problem of trust chain of Trusted Computing Group (TCG), which only measures static integrity to the system resources, we extend the...
1869