Misuse detection

to get instant updates about 'Misuse Detection' on your MyPage. Meet other similar minded people. Its Free!


All Updates

Misuse detection actively works against potential insider threats to vulnerable company data.


Misuse detection is an approach in detecting attacks. In misuse detection approach, we define abnormal system behaviour at first, and then define any other behaviour, as normal behaviour. It stands against anomaly detection approach which utilizes the reverse approach, defining normal system behaviour and defining any other behaviour as abnormal.In other words anything we don't know is normal. Using attack signatures in IDSes is an example of this approach.

Misuse detection has also been used to refer to all kinds of computer misuse.Helman, Paul, Liepins, Gunar, and Richards, Wynette, "Foundations of Intrusion Detection," The IEEE Computer Security Foundations Workshop V, 1992 See Intrusion detection.


In theory, It assumes that abnormal behaviour and activity has a simple to define model. Its advantage is simplicity of adding known attacks to the model.Its disadvantage is its inability to recognize unknown attacks.


Further reading

For more information on Misuse Detection, including papers written on the subject, consider the following:
  • - article by the IR Lab at IIT.

Read More

No feeds found

Posting your question. Please wait!...

No updates available.
No messages found
Suggested Pages
Tell your friends >
about this page
 Create a new Page
for companies, colleges, celebrities or anything you like.Get updates on MyPage.
Create a new Page
 Find your friends
  Find friends on MyPage from