Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)


 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
CLASSIFICATION AND DETECTION OF COMPUTER INTRUSIONS
Post: #1

CLASSIFICATION AND DETECTION OF COMPUTER INTRUSIONS



.pdf  95-08.pdf (Size: 639.54 KB / Downloads: 66)


INTRODUCTION
In this chapter we motivate the need for securing computer systems and discuss
the role of intrusion detection in their security. We give a broad overview of the
eld of intrusion detection as it is presented in the literature. In the next chapter we
survey approaches that have been taken in other systems for detecting intrusions.

Computer Security and its Role

One broad de nition of a secure computer system is given by Gar nkel and Spaf-
ford [GS91] as one that can be depended upon to behave as it is expected to. The
dependence on the expected behavior being the same as exhibited behavior is re-
ferred to as trust in the security of the computer system. The level of trust indicates
the con dence in the expected behavior of the computer system. The expected be-
havior is formalized into the security policy of the computer system and governs the
goals that the system must meet. This policy may include functionality requirements
if they are necessary for the e ective functioning of the computer system.
A narrower de nition of computer security is based on the realization of con -
dentiality, integrity, and availability in a computer system [RS91]. Con dentiality
requires that information be accessible only to those authorized for it, integrity re-
quires that information remain unaltered by accidents or malicious attempts, and
availability means that the computer system remains working without degradation of
access and provides resources to authorized users when they need it. By this de ni-
tion, an unreliable computer system is unsecure if availability is part of its security
requirements.
A secure computer system protects its data and resources from unauthorized ac-
cess, tampering, and denial of use. Con dentiality of data may be important to the

commercial success or survival of a corporation, data integrity may be important to
a hospital that maintains medical histories of patients and uses it to make life critical
decisions, and data availability may be necessary for real-time trac control.
There is a close relationship between the functional correctness of a computer sys-
tem and its security. Functional correctness implies that a computer system meets its
speci cations. If the functionality speci cation includes security policy requirements,
then functional correctness implies security of the computer system. However, the
reverse is not true, i.e., functional error may not result in violations of the security pol-
icy, especially as it relates to con dentiality, integrity, and availability. For example,
an operating system service call may not process all valid arguments to it correctly,
yet it may not be possible to violate the security policy by taking advantage of this
fact. As another example, consider a visual (WYSIWYG) word processing program
that fails to highlight user selections on the display. The program is likely not func-
tionally correct, but this behavior may not cause a violation of the system security
policy.

Threats to Security

As a society we are becoming increasingly dependent on the rapid access and
processing of information. As this demand has increased, more information is being
stored on computers. The increased use of computers has made rapid tabulation of
data from di erent sources possible. Correlation of information from di erent sources
has allowed additional information to be inferred that may be dicult to obtain
directly. The proliferation of inexpensive computers and of computer networks has
exacerbated the problem of unauthorized access and tampering with data. Increased
connectivity not only provides access to larger and varied resources of data more
quickly than ever before, it also provides an access path to the data from virtually
anywhere on the network [Pow95]. In many cases, such as the Internet worm attack
of 1988 [Spa89], network intruders have easily overcome the password authentication
mechanisms designed to protect systems.
Post: #2
Unauthorized access to your computer / service / or data is called intrusion.

Access could be physical or logical.

Think of physical access as someone breaking into your house and access your computer using the username and password you have in the notes attached to the computer.

Logical access is where the attacker can access your computer / service or data over the network, it does not have to be physically on your machine.
 

Marked Categories : seminar based on the classification of computer, seminar topics classification computer,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  website for e friendship ty bsc computer science project Guest 1 187 08-01-2018 01:13 PM
Last Post: dhanabhagya
  detection of tumor in mri using vector quantization segmentation with matlab code Guest 1 243 08-01-2018 12:33 PM
Last Post: dhanabhagya
Smile notes for fyjc computer science Guest 1 238 08-01-2018 12:03 PM
Last Post: dhanabhagya
  FRBSIFC: Fuzzy Rule Based System for Iris Flower Classification seminar class 1 2,276 07-01-2018 09:25 PM
Last Post: Raymondnof
  diabetic retinopathy detection image processing ppt Guest 1 0 22-11-2017 04:42 PM
Last Post: jaseela123
  computer application practical lab manual in diploma Guest 1 187 18-11-2017 11:26 AM
Last Post: jaseela123
  rnsit notes of computer science 7th sem 2014 Guest 1 476 18-11-2017 10:12 AM
Last Post: jaseela123
  threat to a computer both hardware and software remedies ppt Guest 1 236 17-11-2017 02:40 PM
Last Post: jaseela123
  word hunt questions in computer Guest 1 322 17-11-2017 12:09 PM
Last Post: jaseela123
  unrestricted simplex protocol in computer network in c program Guest 1 0 25-10-2017 04:25 PM
Last Post: jaseela123
This Page May Contain What is CLASSIFICATION AND DETECTION OF COMPUTER INTRUSIONS And Latest Information/News About CLASSIFICATION AND DETECTION OF COMPUTER INTRUSIONS,If Not ...Use Search to get more info about CLASSIFICATION AND DETECTION OF COMPUTER INTRUSIONS Or Ask Here

Options: