Computer system security violations and misuses are inherent part of the increasing evolution and utilization of the information technology. Trusted computer evaluation criteria define manners to counter and limit these threats to the good functioning of a computer system environment, threats that can sometimes have considerable consequences. One possible counter-measure, proposed in this document, is to log the activities of the users on a system and produce security audit trails that permit after-the-fact analysis of these activities to detect possible security breaches going from manipulation errors to voluntary attacks. These security audit trails may be analysed by two types of evaluators : reduction tools that are passive means of analysis and automatic analysis tools that use artificial intelligence techniques to make the evaluation more active or "intelligent", and in some case to react in real-time against the discovered attack.
la date de réponse | 1991 |
---|
langue originale | Anglais |
---|
L'institution diplômante | |
---|
Superviseur | Jean RAMAEKERS (Promoteur) |
---|
Towards "Intelligent" Security Audit Trail Analysis Tools
Libion, F. (Auteur). 1991
Student thesis: Master types › Master en sciences informatiques