作者: Teresa F. Lunt
DOI: 10.1016/0167-4048(93)90029-5
关键词:
摘要: Today's computer systems are vulnerable both to abuse by insiders and penetration outsiders, as evidenced the growing number of incidents reported in press. To close all security loopholes from today's is infeasible, no combination technologies can prevent legitimate users abusing their authority a system; thus auditing viewed last line defense. Over past several years, community has been developing automated tools analyze system audit data for suspicious user behavior. This paper describes use such detecting intrusion further that may be detection future.