TY - JOUR
T1 - Analysis of active intrusion prevention data for predicting hostile activity in computer networks
AU - Green, Ido
AU - Raz, Tzvi
AU - Zviran, Moshe
PY - 2007/4/1
Y1 - 2007/4/1
N2 - The wide use of the computer networks and the Internet has increased the concern for the security and protection from hostile activity. Many organizations are using additional protective measures in the form of intrusion detection systems (IDS) to monitor the activity on the network to detect the unusual, and potentially hostile activity. Intrusion prevention systems (IPS) block the attacks in real time and provide an additional layer of security, and operate online by matching network activity patterns to the signatures of known modes of attack. A new approach called Active Intrusion Prevention (AIP) is emerged that examines all the activities on the network, and provides the requested data with an early and accurate identification, prior to the actual break-in and protection from all types of attacks. AIP systems are analyzed with predictive models and logit regression analysis and then applied to enhance computer network security.
AB - The wide use of the computer networks and the Internet has increased the concern for the security and protection from hostile activity. Many organizations are using additional protective measures in the form of intrusion detection systems (IDS) to monitor the activity on the network to detect the unusual, and potentially hostile activity. Intrusion prevention systems (IPS) block the attacks in real time and provide an additional layer of security, and operate online by matching network activity patterns to the signatures of known modes of attack. A new approach called Active Intrusion Prevention (AIP) is emerged that examines all the activities on the network, and provides the requested data with an early and accurate identification, prior to the actual break-in and protection from all types of attacks. AIP systems are analyzed with predictive models and logit regression analysis and then applied to enhance computer network security.
UR - http://www.scopus.com/inward/record.url?scp=33947692292&partnerID=8YFLogxK
U2 - 10.1145/1232743.1232749
DO - 10.1145/1232743.1232749
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.systematicreview???
AN - SCOPUS:33947692292
SN - 0001-0782
VL - 50
SP - 63
EP - 68
JO - Communications of the ACM
JF - Communications of the ACM
IS - 4
ER -