Towards Detecting Intrusions in a Networked Environment

dc.contributor.authorLevitt, K
dc.contributor.authorDias, G
dc.date.accessioned2017-01-17T10:06:29Z
dc.date.available2017-01-17T10:06:29Z
dc.description.abstractAbstract To date, current access control mechanisms have been shown to be insufficient for preventing intrusive activity in computer systems. The frequent media reports, and now our own research, have shown the widespread proliferation of intrusive behavior on the world's computer systems. With the recognition of the failure of access control mechanisms, a number of institutions have begun to research methods to detect the intrusive activity.en_US
dc.identifier.emailgihan@uom.lken_US
dc.identifier.pgnos17-47en_US
dc.identifier.urihttp://dl.lib.mrt.ac.lk/handle/123/12254
dc.relation.urihttp://www.netsq.com/documents/NSM_DOE_91.pdfen_US
dc.source.urihttp://www.netsq.com/documents/NSM_DOE_91.pdfen_US
dc.titleTowards Detecting Intrusions in a Networked Environmenten_US
dc.typeArticle-Abstracten_US

Files