An Internal Real-Time Intrusion Detection and Protection System at System Call Level by using Data Mining and Profiling Techniques under the Assistance of a Grid

碩士 === 東海大學 === 資訊工程學系 === 102 === Currently, most computer systems use user IDs and passwords as the login patterns to authenticate their users. However, many users often share the ID and password with their coworkers or crack by hacker, thereby making the two patterns as one of the weakest points...

Full description

Bibliographic Details
Main Authors: Hsiao Yi-Ting, 蕭義庭
Other Authors: Leu Fang-Yie
Format: Others
Language:en_US
Published: 2014
Online Access:http://ndltd.ncl.edu.tw/handle/67089784396160514084