dc.contributor.author | Seleznyov, Alexandr | |
dc.date.accessioned | 2008-01-09T12:55:51Z | |
dc.date.available | 2008-01-09T12:55:51Z | |
dc.date.issued | 2002 | |
dc.identifier.isbn | 951-39-1287-6 | |
dc.identifier.other | oai:jykdok.linneanet.fi:880946 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/13263 | |
dc.description.abstract | Recently computer systems have become a critical part of network-connected system, possessing essential economic and human values to individuals and organizations. This key role of the systems has increased the requirements for their protection. They have to be more resistant against malicious activities. Intrusion detection is aimed at detecting and preventing such activities. It forms the last line of defence in the overall protection scheme of a computer system. It is useful not only in detecting successful breaches of security, but also for monitoring attempts to breach security, which provides important information for timely countermeasures. Thus, intrusion detection systems are useful even when strong preventive steps are taken to protect computer systems. In anomaly detection, computer systems compare current events with expected or predicted events. In this thesis, a typical decision problem in anomaly detection is transformed into three scenarios: what event is going to happen in the future, when, and how much danger it may cause. | en |
dc.format.extent | verkkoaineisto. | |
dc.language.iso | eng | |
dc.publisher | Jyväskylän yliopisto | |
dc.relation.ispartofseries | Jyväskylä studies in computing | |
dc.relation.isversionof | Myös painettuna. | |
dc.rights | In Copyright | |
dc.title | An anomaly intrusion detection system based on Intelligent user recognition | |
dc.type | Diss. | |
dc.identifier.urn | URN:ISBN:951-39-1287-6 | |
dc.type.dcmitype | Text | en |
dc.type.ontasot | Väitöskirja | fi |
dc.type.ontasot | Doctoral dissertation | en |
dc.contributor.tiedekunta | Informaatioteknologian tiedekunta | fi |
dc.contributor.tiedekunta | Faculty of Information Technology | en |
dc.contributor.yliopisto | University of Jyväskylä | en |
dc.contributor.yliopisto | Jyväskylän yliopisto | fi |
dc.contributor.oppiaine | Tietojenkäsittelytiede | fi |
dc.relation.issn | 1456-5390 | |
dc.relation.numberinseries | 22 | |
dc.rights.accesslevel | openAccess | |
dc.subject.yso | tietojärjestelmät | |
dc.subject.yso | tietokoneet | |
dc.subject.yso | tietoturva | |
dc.subject.yso | tunnistimet | |
dc.subject.yso | hakkerointi | |
dc.subject.yso | käyttöjärjestelmät | |
dc.subject.yso | virustentorjuntaohjelmat | |
dc.rights.url | https://rightsstatements.org/page/InC/1.0/ | |