Please enable JavaScript.
Coggle requires JavaScript to display documents.
8 - Intrusion Detection - Coggle Diagram
8 - Intrusion Detection
unwanted/hostile
User trespass: unauthorized logon, privilege abuse
Software trespass: virus, worm, trojan horse
-
-
Anomaly Detection
2) compare the observed with the current model in order to classify it as either legitimate or anomalous activity
1) collect and processing data from the normal operation of the monitored system in a training phase
-
-
-
-