Formulation of a Heuristic Rule for Misuse and Anomaly Detection for U2R Attacks in Solaris Operating System Environment.
Maheshkumar SabhnaniGürsel SerpenPublished in: Security and Management (2003)
Keyphrases
- anomaly detection
- operating system
- operating environment
- misuse detection
- network anomaly detection
- computer security
- intrusion detection
- intrusion detection system
- network intrusion
- network intrusion detection
- computer systems
- normal behavior
- security mechanisms
- detecting anomalies
- anomalous behavior
- network traffic
- virtual machine
- microsoft windows
- malware detection
- detect anomalies
- distributed systems
- network security
- windows xp
- one class support vector machines
- negative selection algorithm
- normal traffic
- data mining
- traffic analysis
- unsupervised learning
- databases
- virtual memory
- memory management
- data mining techniques
- object oriented