Abstract

Addresses specific problems within the area of performing computer system intrusion detection, and presents the reader with an effective decision model to addressing these problems. Current intrusion detection analysis methods are reluctant to properly evaluate the results of decisions made based on their analysis outcomes. These analysis outcomes influence the decision making process involved in response to an intrusion. Utilizing basic decision modeling methods we can develop a model that is both effective and easy to use. To form this model we must have the following within our environment; standard analysis procedure and the classification of information elements. These will feed into our structured decision model and aid in our final decision outcome.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.