PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Data clustering for the block profile method of intruder detection

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The paper concerns the problem of computer security and intrusion detection. In particular the problem of detecting the masqueraders – intruders who pretend to be authorized users of computer systems. The article presents an improvement of the block profile method of intruder detection for computer systems. As a base for the work the block profiles were taken and the clustering of the block profiles data was performed. The aim was to detect the masqueraders within the test data. The problem of computer security is particularly important in medical applications. Activities of intruder can distort the data stored in medical databases and analyzed by the medical expert systems or decision support systems and thus make it difficult to support the diagnosis of diseases. For this reason it is necessary protect the medical computer systems from unauthorized access. This article presents the preliminary research and conclusions.
Rocznik
Tom
Strony
209--216
Opis fizyczny
Bibliogr. 8 poz., wykr.
Twórcy
  • University of Silesia, Institute of Computer Science, Bedzinska 39, 41-200 Sosnowiec, Poland
autor
  • University of Silesia, Institute of Computer Science, Bedzinska 39, 41-200 Sosnowiec, Poland
Bibliografia
  • [1] BARTKOWIAK A. M., Block and command profiles for legitimate users of a computer network, Computer Information Systems - Analysis and Technologies - 10th International Conference, CISIM 2011, Proceedings. Communications in Computer and Information Science 245, Springer, 2011, pp. 295-304.
  • [2] DENNING D. E., Cyberspace attacks and countermeasures, In Internet Besieged D. E. Denning, P. J. Denning (eds), ACM Press, New York, 1997, pp. 29-55.
  • [3] HASTIE T., TIBSHIRANI R., FRIEDMAN J., The Elements of Statistical Learning (2nd edition), Springer-Verlag, 2009.
  • [4] PORWIK P., SOSNOWSKI M., WESOŁOWSKI T., WRÓBEL K., Computational Assessment of a Blood Vessels Compliance: A Procedure Based on Computed Tomography Coronary Angiography, LNAI, Springer, 2011, Vol. 6678/1, pp. 428-435.
  • [5] SALEM M. B., HERSHKOP S., STOLFO S. J., A survey of insider attack detection research, Insider Attack and Cyber Security: Beyond the Hacker, Springer, 2008, pp. 69-90.
  • [6] SCHONLAU M. et al., Computer intrusion: detecting masquerades, Statistical Science, 2001, Vol. 16, pp. 58-74.
  • [7] SCHONLAU M., Masquerading user data, http://www.schonlau.net.
  • [8] SCHONLAU M., THEUS M., Detecting Masquerades in Intrusion Detection Based on Unpopular Commands, Information Processing Letters 76, 2000, pp. 33-38.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-27ebec3f-e01b-415f-98d3-b14f17d76fb5
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.