32,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

In this work, we have dealt with Intrusion Detection, ID, to secure a medical application deployed on pervasive devices. ID Systems, IDSs, are used to monitor a resource and notify someone in the event of a specific occurrence for an appropriate response. Based on attack identification, they can be those which implement misuse detection, matching against known attack patterns, and those which implement anomaly detection, deviation from normal patterns. Misuse detection is used for matching only known patterns of attacks while anomaly detection is capable of identifying new attacks by matching…mehr

Produktbeschreibung
In this work, we have dealt with Intrusion Detection,
ID, to secure a medical application deployed on
pervasive devices. ID Systems, IDSs, are used to
monitor a resource and notify someone in the event of
a specific occurrence for an appropriate response.
Based on attack identification, they can be those
which implement misuse detection, matching against
known attack patterns, and those which implement
anomaly detection, deviation from normal patterns.
Misuse detection is used for matching only known
patterns of attacks while anomaly detection is
capable of identifying new attacks by matching with
an already established normal profile. Based on
source of information for the IDS, it may be
host-based, network-based or application-based. For
our case, we deal with application based anomaly
detection modeling issues through building normal
users application usage profiles.
Autorenporträt
Biniyam Asfaw (BSc and MSc in Computer Science, Addis Ababa
University, Ethiopia)