This paper introduces the definition as well as the functions of data intrusion detection and also puts forward the problems existing in computer intrusion detection technology, with the introduction of the common DM ways and technology.
From the perspective of defense, the functions of computer intrusion detection technology are as follows: firstly, it can examine the weak links of the entire computer system; secondly, it can monitor all the operations in the computer in real time; thirdly, it can analyzed all kinds of abnormal behaviors deeply and react correspondingly; fourthly, it can record every abnormal behavior, which will offer a basis for the following detection, thereby enforces the safety protection of the computer (Oliker N.
The Problems Existing in the Computer Intrusion Detection Technology
This phenomenon makes the research staff of computer intrusion detection technology require much.
So the study of intrusion technology expansibility should be intensified in the future computer intrusion detection technology research.
Complete the Computer Intrusion Detection Technology
As a result, when completing the computer intrusion detection technology, the workload of calculation should firstly be reduced.
Papers from a May 2005 symposium reflect the latest work in computer intrusion detection
, sensor networks, access control and authentication, integrity, cryptography and protocols, and worms and network forensics.
The funding proposals include US$500m for research and development efforts to safeguard networks, installation of computer intrusion detection
networks at US federal agencies, the establishment of information sharing and analysing centres, which will enable the US government to provide the private industry with threat information and a programme that will allow government agencies to recruit highly-skilled computer science experts to respond to computer network attacks.
The 1997 AAAI Workshop on AI Approaches to Fraud Detection and Risk Management brought together over 50 researchers and practitioners to discuss problems of fraud detection, computer intrusion detection, and risk scoring.
The purpose of the workshop was to gather researchers and practitioners working in the areas of risk management, fraud detection, and computer intrusion detection.
Using the audit reduction and search capabilities of the company's computer intrusion detection
system (IDS) software, the manager discovered that the one user's account was being used by four people, which was against security policy.