A methodology to detect intrusion using system call based on discriminant analysis
An intrusion detection system seeks to identify unauthorized access to computer systems' resources and data. Many methods have been proposed to detect intrusion; for example, the pattern matching method to finding intrusion by matching sample data to know intrusive patterns and the statistical...
Saved in:
| Main Authors: | , |
|---|---|
| 格式: | Conference or Workshop Item |
| 出版: |
2003
|
| 在线阅读: | http://eprints.utm.my/3417/ |
| 标签: |
添加标签
没有标签, 成为第一个标记此记录!
|