NETWORK SECURITY THROUGH DATA ANALYSIS
According to O’Leary (1992), being among the first researchers to point to the trend ofdeveloping intrusion-detection systems. These systems could detect potential and actual intrudersinto the computer systems. The system was based on the user behavior, typically the userpreferences, network usage and course of action in given situation is analyzed. Therefore, thesystem builds profiles of expected user behavior and uses these stored patterns as a […]