This article is rated Stub-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||||||||||||
|
Untitled
editMisuse detection means the use of an Expert System to find known patterns of misuse. Anomaly detection is when one looks for abnormal behavior. I'll get a reference on this. Clangin (talk) 04:43, 5 July 2008 (UTC)
Here's some references to back up your claim:
- Sabahi, Farzad, and Ali Movaghar. "Intrusion detection: A survey." Systems and Networks Communications, 2008. ICSNC'08. 3rd International Conference on. IEEE, 2008
- Axelsson, Stefan. Intrusion detection systems: A survey and taxonomy. Vol. 99. Chalmers University of Technology, Goteborg, Sweden: Technical report, 2000.
If I get time in the next few weeks, I'll edit the page appropriately. Karategeek6 (talk) 15:59, 22 February 2016 (UTC)