Matches in SemOpenAlex for { <https://semopenalex.org/work/W128382004> ?p ?o ?g. }
Showing items 1 to 54 of
54
with 100 items per page.
- W128382004 abstract "Computer security is an area of ever increasing importance. Our society relies on computerised services, which gives many reasons for computer criminals, attackers, terrorists, hackers, crackers, fraudsters, or whatever name is appropriate, to break these systems. To deal with security problems, many types of mechanisms have been developed. One mechanism is the intrusion detection system (IDS), designed to detect ongoing attacks, detect attacks after the fact or even detect preparations for an attack. The IDS is complementary to preventive security mechanisms, such as firewalls and authentication systems, which can never be made 100% secure. A similar type of system is the fraud detection system (FDS), specialised to detect frauds (or attacks) in commercial services in different business areas, such as telecom, insurance and banking. Fraud detection can be considered a special case of intrusion detection. A crucial part of intrusion or fraud detection is to have good quality input data for the analysis, as well as for training and testing the systems. However, it is difficult to acquire any training and test data and it is not known what kind of log data are most suitable to use for detection. The contribution of this thesis is to offer guidance in matters of acquiring more suitable log data for intrusion and fraud detection. The first part is general and gives a survey of research done in intrusion detection and shows that intrusion and fraud detection reflect different aspects of the same problem. The second part is devoted to improving the availability and quality of log data used in intrusion and fraud detection. The availability of log data for training and testing detection systems can be improved by solving the privacy issues that prevent computer system owners from releasing their log data. Therefore, a method is suggested for anonymising the log data in a way that does not significantly affect their usefulness for detection. Though authentic data are convenient to use for training and testing they do not always have the desirable properties, which include flexibility and control of content. Another contribution to improve the availability and also the quality of log data is thus a method for creating synthetic training and test data with suitable properties. This part also includes a methodology for determining exactly which log data can be used for detecting specific attacks. In the ideal situation, we only collect exactly the data needed for detection, and this methodology can help us develop more efficient and adapted log sources. These new log sources will improve the quality of log data used for intrusion and fraud detection." @default.
- W128382004 created "2016-06-24" @default.
- W128382004 creator A5080617385 @default.
- W128382004 date "2004-01-01" @default.
- W128382004 modified "2023-09-27" @default.
- W128382004 title "Logging for Intrusion and Fraud Detection" @default.
- W128382004 hasPublicationYear "2004" @default.
- W128382004 type Work @default.
- W128382004 sameAs 128382004 @default.
- W128382004 citedByCount "11" @default.
- W128382004 countsByYear W1283820042015 @default.
- W128382004 crossrefType "dissertation" @default.
- W128382004 hasAuthorship W128382004A5080617385 @default.
- W128382004 hasConcept C111472728 @default.
- W128382004 hasConcept C138885662 @default.
- W128382004 hasConcept C2779530757 @default.
- W128382004 hasConcept C35525427 @default.
- W128382004 hasConcept C38652104 @default.
- W128382004 hasConcept C41008148 @default.
- W128382004 hasConcept C86844869 @default.
- W128382004 hasConceptScore W128382004C111472728 @default.
- W128382004 hasConceptScore W128382004C138885662 @default.
- W128382004 hasConceptScore W128382004C2779530757 @default.
- W128382004 hasConceptScore W128382004C35525427 @default.
- W128382004 hasConceptScore W128382004C38652104 @default.
- W128382004 hasConceptScore W128382004C41008148 @default.
- W128382004 hasConceptScore W128382004C86844869 @default.
- W128382004 hasLocation W1283820041 @default.
- W128382004 hasOpenAccess W128382004 @default.
- W128382004 hasPrimaryLocation W1283820041 @default.
- W128382004 hasRelatedWork W143341167 @default.
- W128382004 hasRelatedWork W1540744846 @default.
- W128382004 hasRelatedWork W1555941225 @default.
- W128382004 hasRelatedWork W1595212988 @default.
- W128382004 hasRelatedWork W2004273643 @default.
- W128382004 hasRelatedWork W2034890060 @default.
- W128382004 hasRelatedWork W2080966444 @default.
- W128382004 hasRelatedWork W2167178056 @default.
- W128382004 hasRelatedWork W2183773207 @default.
- W128382004 hasRelatedWork W2329054532 @default.
- W128382004 hasRelatedWork W2594737599 @default.
- W128382004 hasRelatedWork W2610823415 @default.
- W128382004 hasRelatedWork W2768025005 @default.
- W128382004 hasRelatedWork W2911577367 @default.
- W128382004 hasRelatedWork W2994676060 @default.
- W128382004 hasRelatedWork W3207920586 @default.
- W128382004 hasRelatedWork W345865528 @default.
- W128382004 hasRelatedWork W2187081254 @default.
- W128382004 hasRelatedWork W2187643922 @default.
- W128382004 hasRelatedWork W2810618621 @default.
- W128382004 isParatext "false" @default.
- W128382004 isRetracted "false" @default.
- W128382004 magId "128382004" @default.
- W128382004 workType "dissertation" @default.