冒名顶替者异常检测

A. Tazerouti, A. Ikram
{"title":"冒名顶替者异常检测","authors":"A. Tazerouti, A. Ikram","doi":"10.4314/JFAS.V13I1.14","DOIUrl":null,"url":null,"abstract":"Over the last two decades the world of cyber security has grown immensely, but despite the state-of-the-art security detection systems and intrusion detection systems (IDSs), unwanted malicious users still find their way around these security measures and gain access to secure systems. This study consists of shedding some light on the security issues in the intrusion detection systems, their vulnerabilities and drawbacks. A hypothesis is proposed to help mitigate these issues and obtain a fast and a more precise method for the detection of different malicious intruders and imposters, study their behavior and make a statistical comparison of data from the used IDSs and throughout the process. This study will state the current available technologies of IDSs, site their challenges and implement a new software-based methodology to increase the detection and reduce false alarm rates for the IDS.","PeriodicalId":15885,"journal":{"name":"Journal of Fundamental and Applied Sciences","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Imposters anomaly detection\",\"authors\":\"A. Tazerouti, A. Ikram\",\"doi\":\"10.4314/JFAS.V13I1.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Over the last two decades the world of cyber security has grown immensely, but despite the state-of-the-art security detection systems and intrusion detection systems (IDSs), unwanted malicious users still find their way around these security measures and gain access to secure systems. This study consists of shedding some light on the security issues in the intrusion detection systems, their vulnerabilities and drawbacks. A hypothesis is proposed to help mitigate these issues and obtain a fast and a more precise method for the detection of different malicious intruders and imposters, study their behavior and make a statistical comparison of data from the used IDSs and throughout the process. This study will state the current available technologies of IDSs, site their challenges and implement a new software-based methodology to increase the detection and reduce false alarm rates for the IDS.\",\"PeriodicalId\":15885,\"journal\":{\"name\":\"Journal of Fundamental and Applied Sciences\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Fundamental and Applied Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4314/JFAS.V13I1.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Fundamental and Applied Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4314/JFAS.V13I1.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在过去的二十年里,网络安全领域取得了巨大的发展,但尽管有最先进的安全检测系统和入侵检测系统(IDS),不受欢迎的恶意用户仍然可以绕过这些安全措施,访问安全系统。本研究旨在揭示入侵检测系统中的安全问题及其漏洞和缺点。提出了一个假设,以帮助缓解这些问题,并获得一种快速、更精确的方法来检测不同的恶意入侵者和冒名顶替者,研究他们的行为,并对所使用的IDS和整个过程中的数据进行统计比较。本研究将阐述IDS的当前可用技术,定位其挑战,并实施一种新的基于软件的方法,以提高IDS的检测能力并降低误报率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Imposters anomaly detection
Over the last two decades the world of cyber security has grown immensely, but despite the state-of-the-art security detection systems and intrusion detection systems (IDSs), unwanted malicious users still find their way around these security measures and gain access to secure systems. This study consists of shedding some light on the security issues in the intrusion detection systems, their vulnerabilities and drawbacks. A hypothesis is proposed to help mitigate these issues and obtain a fast and a more precise method for the detection of different malicious intruders and imposters, study their behavior and make a statistical comparison of data from the used IDSs and throughout the process. This study will state the current available technologies of IDSs, site their challenges and implement a new software-based methodology to increase the detection and reduce false alarm rates for the IDS.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
审稿时长
16 weeks
期刊最新文献
Statistical study and analysis of annual rainfall in the Naama region (Algeria) Experimental study of the flow of viscous Newtonian fluids in a centrifugal pump A DFT study of Hyper-Rayleigh Scattering (HRS) first hyperpolarizability of substituted polyene: Part (ii) Crystal structure and Hirshfeld analysis of (C Times effect on morphological, structural and optical behaviors of cds thin films for photoelectrochemical cells application
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1