Anomaly detection (Computer security)
URI(s)
Variants
Broader Terms
Exact Matching Concepts from Other Schemes
Closely Matching Concepts from Other Schemes
Sources
found: Work cat.: Nassehi, M.M. Anomaly detection for Markov models, 1998:p. 1 (Anomaly detection is an intrusion-detection technique in which any significant deviation of the current characteristics of a process from its expected characteristics generates an alarm)
found: McGraw-Hill dictionary of scientific and technical terms, 2003(anomaly detection -- The technology that seeks to identify an attack on a computer system by looking for behavior that is out of the norm)
found: TechEncyclopedia, via WWW, Nov. 17, 2005(Anomaly detection ... An approach to intrusion detection that establishes a baseline model of behavior for users and components in a computer system or network. Deviations from the baseline cause alerts that direct the attention of human operators to the anomalies)
found: Glossary of web application security terms, via WWW, Nov. 17, 2005(Anomaly detection -- Behavior-based anomaly detection compares a profile of all allowed application behavior to actual traffic. Any deviation from the profile is flagged as a potential attack. It is commonly referred to as a positive security model because it seeks only to identify all known good behaviors and assumes that everything else is bad)
found: Information Systems Audit and Control Association glossary, via WWW, Nov. 17, 2005(Anomaly detection -- Detection on the basis of whether the system activity matched that defined as abnormal)
notfound: Dictionary of computing, 1996;Dictionary of computer and internet words, 2001;Encyclopedia of computer science, 2000;Dictionary of computer science, engineering, and technology, 2001
Instance Of
Scheme Membership(s)
Collection Membership(s)
Change Notes
Alternate Formats