Today, security is of strategic importance for many computer science applications. Unfortunately, an optimal solution does not exist and often system administrators are faced with new security problems when trying to protect computing resources within a reasonable time. Security applications that seem effective at first, could actually be unsuitable. This paper introduces a way of developing flexible Computer security solutions which can allow system administrators to intervene rapidly on systems by adapting not only existing solutions but new ones as well. To this end, the study suggests considering the problem of intrusion detection as a Knowledge Discovery process and to describe it in terms of both e-services and miner building blocks. In addition, a definition of an intrusion detection process using Web content analysis generated by users is presented.

Composing miners to develop an intrusion detection solution / Castellano, Marcello; Mastronardi, Giuseppe; Pisciotta, L.; Tarricone, G.. - 5456:(2009), pp. 55-73. (Intervento presentato al convegno 2nd ACM SIGKDD International Workshop on Privacy, Security and Trust in KDD, PinKDD 2008 tenutosi a Las Vegas, NV nel August 24-27, 2008) [10.1007/978-3-642-01718-6_5].

Composing miners to develop an intrusion detection solution

CASTELLANO, Marcello;MASTRONARDI, Giuseppe;
2009-01-01

Abstract

Today, security is of strategic importance for many computer science applications. Unfortunately, an optimal solution does not exist and often system administrators are faced with new security problems when trying to protect computing resources within a reasonable time. Security applications that seem effective at first, could actually be unsuitable. This paper introduces a way of developing flexible Computer security solutions which can allow system administrators to intervene rapidly on systems by adapting not only existing solutions but new ones as well. To this end, the study suggests considering the problem of intrusion detection as a Knowledge Discovery process and to describe it in terms of both e-services and miner building blocks. In addition, a definition of an intrusion detection process using Web content analysis generated by users is presented.
2009
2nd ACM SIGKDD International Workshop on Privacy, Security and Trust in KDD, PinKDD 2008
978-3-642-01717-9
978-3-642-01718-6
Composing miners to develop an intrusion detection solution / Castellano, Marcello; Mastronardi, Giuseppe; Pisciotta, L.; Tarricone, G.. - 5456:(2009), pp. 55-73. (Intervento presentato al convegno 2nd ACM SIGKDD International Workshop on Privacy, Security and Trust in KDD, PinKDD 2008 tenutosi a Las Vegas, NV nel August 24-27, 2008) [10.1007/978-3-642-01718-6_5].
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11589/14383
Citazioni
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 1
social impact