Näytä suppeat kuvailutiedot

dc.contributor.authorSeleznyov, Alexandr
dc.date.accessioned2008-01-09T12:55:51Z
dc.date.available2008-01-09T12:55:51Z
dc.date.issued2002
dc.identifier.isbn951-39-1287-6
dc.identifier.otheroai:jykdok.linneanet.fi:880946
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/13263
dc.description.abstractRecently computer systems have become a critical part of network-connected system, possessing essential economic and human values to individuals and organizations. This key role of the systems has increased the requirements for their protection. They have to be more resistant against malicious activities. Intrusion detection is aimed at detecting and preventing such activities. It forms the last line of defence in the overall protection scheme of a computer system. It is useful not only in detecting successful breaches of security, but also for monitoring attempts to breach security, which provides important information for timely countermeasures. Thus, intrusion detection systems are useful even when strong preventive steps are taken to protect computer systems. In anomaly detection, computer systems compare current events with expected or predicted events. In this thesis, a typical decision problem in anomaly detection is transformed into three scenarios: what event is going to happen in the future, when, and how much danger it may cause.en
dc.format.extentverkkoaineisto.
dc.language.isoeng
dc.publisherJyväskylän yliopisto
dc.relation.ispartofseriesJyväskylä studies in computing
dc.relation.isversionofMyös painettuna.
dc.rightsIn Copyright
dc.titleAn anomaly intrusion detection system based on Intelligent user recognition
dc.typeDiss.
dc.identifier.urnURN:ISBN:951-39-1287-6
dc.type.dcmitypeTexten
dc.type.ontasotVäitöskirjafi
dc.type.ontasotDoctoral dissertationen
dc.contributor.tiedekuntaInformaatioteknologian tiedekuntafi
dc.contributor.tiedekuntaFaculty of Information Technologyen
dc.contributor.yliopistoUniversity of Jyväskyläen
dc.contributor.yliopistoJyväskylän yliopistofi
dc.contributor.oppiaineTietojenkäsittelytiedefi
dc.relation.issn1456-5390
dc.relation.numberinseries22
dc.rights.accesslevelopenAccess
dc.subject.ysotietojärjestelmät
dc.subject.ysotietokoneet
dc.subject.ysotietoturva
dc.subject.ysotunnistimet
dc.subject.ysohakkerointi
dc.subject.ysokäyttöjärjestelmät
dc.subject.ysovirustentorjuntaohjelmat
dc.rights.urlhttps://rightsstatements.org/page/InC/1.0/


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright