Talk:Misuse detection
Appearance
![]() | This article has not yet been rated on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
Please add the quality rating to the {{WikiProject banner shell}} template instead of this project banner. See WP:PIQA for details.
|
Untitled
Misuse detection means the use of an Expert System to find known patterns of misuse. Anomaly detection is when one looks for abnormal behavior. I'll get a reference on this. Clangin (talk) 04:43, 5 July 2008 (UTC)
Here's some references to back up your claim:
- Sabahi, Farzad, and Ali Movaghar. "Intrusion detection: A survey." Systems and Networks Communications, 2008. ICSNC'08. 3rd International Conference on. IEEE, 2008
- Axelsson, Stefan. Intrusion detection systems: A survey and taxonomy. Vol. 99. Chalmers University of Technology, Goteborg, Sweden: Technical report, 2000.
If I get time in the next few weeks, I'll edit the page appropriately. Karategeek6 (talk) 15:59, 22 February 2016 (UTC)
Categories:
- All unassessed articles
- Stub-Class Computer science articles
- Low-importance Computer science articles
- WikiProject Computer science articles
- Stub-Class Computer security articles
- Mid-importance Computer security articles
- Stub-Class Computer security articles of Mid-importance
- Stub-Class Computing articles
- Low-importance Computing articles
- All Computing articles
- All Computer security articles