Jump to content

Misuse detection

From Wikipedia, the free encyclopedia
This is the current revision of this page, as edited by Sohom Datta (talk | contribs) at 06:23, 31 August 2024 (Theory: ?). The present address (URL) is a permanent link to this version.
(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

Misuse detection actively works against potential insider threats to vulnerable computer data.

Misuse

[edit]

Misuse detection is an approach to detecting computer attacks. In a misuse detection approach, abnormal system behaviour is defined first, and then all other behaviour is defined as normal. It stands against the anomaly detection approach which utilizes the reverse: defining normal system behaviour first and defining all other behaviour as abnormal. With misuse detection, anything not known is normal. An example of misuse detection is the use of attack signatures in an intrusion detection system. Misuse detection has also been used more generally to refer to all kinds of computer misuse.[1]

References

[edit]
  1. ^ Helman, Paul, Liepins, Gunar, and Richards, Wynette, "Foundations of Intrusion Detection," The IEEE Computer Security Foundations Workshop V, 1992

Further reading

[edit]

For more information on Misuse Detection, including papers written on the subject, consider the following: