Abstract | ||
---|---|---|
Nowadays, IT systems are widely used to support the services offered from any infrastructure. This allows the improvement of business processes but on the other hand it exposes the infrastructure to cyber-attacks. Misuse and anomaly detection are two widely adopted approaches to discover known and unknown cyberattacks. In this paper we provide an overview of the techniques currently adopted for misuse and anomaly detection and we discuss a conceptual architecture that exploits the advantages of both misuse and anomaly detection to improve cyber-security. Also we provide a conceptual description of an expert system that solves conflicts due to detection mismatches between misuse and anomaly detection techniques. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1007/978-3-319-10422-5_45 | Studies in Computational Intelligence |
Keywords | Field | DocType |
Misuse detection,Anomaly detection,Expert System | Anomaly detection,Business process,Computer security,Information technology,Computer science,Expert system,Exploit,Conceptual architecture,Information technology management,Misuse detection | Conference |
Volume | ISSN | Citations |
570 | 1860-949X | 1 |
PageRank | References | Authors |
0.35 | 12 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mario Sicuranza | 1 | 19 | 5.35 |
Giovanni Paragliola | 2 | 27 | 8.71 |
Cesario Di Sarno | 3 | 34 | 4.68 |
Alessia Garofalo | 4 | 24 | 3.63 |