Intrusion Detection Models Based on Data Mining
Computer intrusions are taking place everywhere, and have become a major concern for information security. Most intrusions to a computer system may result from illegitimate or irregular calls to the operating system, so analyzing the system-call sequences becomes an important and fundamental techniq...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Springer
2012-02-01
|
Series: | International Journal of Computational Intelligence Systems |
Subjects: | |
Online Access: | https://www.atlantis-press.com/article/25867956.pdf |