misuse detection


Also found in: Wikipedia.

misuse detection

[mis′yüs di‚tek·shən]
(computer science)
The technology that seeks to identify an attack on a computer system by its attempted effect on sensitive resources.
Mentioned in ?
References in periodicals archive ?
"An Intelligent Intrusion Detection System (IDS) for anomaly and Misuse Detection in Computer Networks", Elsevier, Expert System with Applications, 29(4): 713-722.
The two important modules in the IDS are misuse detection and anomaly detection [2].
Among the topics are developments in biometrics for a secure human authentication system: a biometric authentication system, combating cyber security breaches in digital world using misuse detection methods, ATM security systems identifying human behavior by critical video surveillance, the effective recognition of stereo image concealed media of interpolation error with difference expansion, and visual cryptography for securing images in cloud.
Misuse detection technology mainly defends against the known virus, attack action and intrusion.
On the other hand, recent intrusion detection systems commonly use two detection technologies, namely, misuse detection and anomaly detection.
An intrusion detection system has two detection methods: misuse detection and anomaly detection [13].
Detection-based techniques can be grouped into two categories: misuse detection and anomaly detection.
Intrusion detection/prevention technique can be divided into misuse detection method and anomaly detection method.
Anomaly detection is based on the flagging of abnormal activities, while signature detection (also known as misuse detection) is based on the flagging of known intruder activities [1].
One is misuse detection and the other is anomaly detection.