Today, security is of strategic importance for many computer science applications. Unfortunately, an optimal solution does not exist and often system administrators are faced with new security problems when trying to protect computing resources within a reasonable time. Security applications that seem effective at first, could actually be unsuitable. This paper introduces a way of developing flexible Computer security solutions which can allow system administrators to intervene rapidly on systems by adapting not only existing solutions but new ones as well. To this end, the study suggests considering the problem of intrusion detection as a Knowledge Discovery process and to describe it in terms of both e-services and miner building blocks. In addition, a definition of an intrusion detection process using Web content analysis generated by users is presented.
|Titolo:||Composing miners to develop an intrusion detection solution|
|Data di pubblicazione:||2009|
|Nome del convegno:||2nd ACM SIGKDD International Workshop on Privacy, Security and Trust in KDD, PinKDD 2008|
|Digital Object Identifier (DOI):||http://dx.doi.org/10.1007/978-3-642-01718-6_5|
|Appare nelle tipologie:||4.1 Contributo in Atti di convegno|