توجه: محتویات این صفحه به صورت خودکار پردازش شده و مقاله‌های نویسندگانی با تشابه اسمی، همگی در بخش یکسان نمایش داده می‌شوند.
۱Detection of an Intruder in an Information System Through the Check of Statistic Hypotheses by Certain Statistic Criteria
اطلاعات انتشار: World Applied Sciences Journal، بيست و نهم،شماره۱۲، ۲۰۱۴، سال
تعداد صفحات: ۴
The article deals with the problem of detecting an intruder in an information system in its function as an issue of checking the statistic hypothesis of homogeneity of data extractions. The solution of the problem based on the application of the statistical analysis to the results of monitoring the user activity in the system is suggested. Two methods were considered in detail based on statistic criteria of comparison of two average parent populations, the variances of which are known for large independent extractions and comparison of two average standard parent populations, the variances of which are unknown and equal. The conclusion is made on the possibility of application of these methods for solution of this problem within the intrusion detection systems.

۲Legitimate User Profiling Based on the Third Order Spline Approximation of the Initial Data Sequence
اطلاعات انتشار: World Applied Sciences Journal، بيست و نهم،شماره۱۲، ۲۰۱۴، سال
تعداد صفحات: ۶
The article deals with an alternate solution of the system intrusion detection problem by developing the user's and the putative intruder's behavior profiles. The third order spline approximation of the initial data sequence is suggested to use as the legitimate user profiling method. Application of the large and small data sampling method is considered. The interval estimation method is proposed to use as the secondary method of defining the expected behaviour frontiers. The comparison of two alternative interval estimations–based on the maximum deviation from the mean value and the deviation at any specific time is adduced.
نمایش نتایج ۱ تا ۲ از میان ۲ نتیجه