抽象的

Post-Attack Detection Using Log Files Analysis

Bharat Sampatrao Borkar, Apurva Suresh Patil

Security has become a most important issue in recent years, for that much intrusion detection systems have been proposed. Though there are lots of systems available we still need a system which will timely detect the intrusions. Proposed system is a host based intrusion detection system can be called is Post-Attack intrusion detection. We are investigating the system log files which contain the log of all system calls. The system has two main features. 1) It reduces the time to locate a particular log with intruder activities by factoring it. 2) A classifier which will classify the normal behaviour form malicious one. To factor the log files sequitur method is used which will reduce the size of log, and a classifier is the main part of system which is using a HMM (Hidden Markov Model) and k-means to classify normal and abnormal behaviour.

免责声明: 此摘要通过人工智能工具翻译,尚未经过审核或验证

索引于

学术钥匙
研究圣经
引用因子
宇宙IF
参考搜索
哈姆达大学
世界科学期刊目录
学者指导
国际创新期刊影响因子(IIJIF)
国际组织研究所 (I2OR)
宇宙

查看更多