M


[M]

Mailbomb

Mail sent to urge others to send massive amounts of e-mail to a single system or person, with the intent of crashing the recipient's system. Mailbombing is widely regarded as a serious offense.

Malicious Code

Hardware, software, or firmware that is intentionally included in a system for an unauthorized purpose (e.g., a Trojan horse).

Metric

A random variable x representing a quantitative measure accumulated over a period.

Mimicking

Synonymous with impersonation, masquerading, or spoofing.

Misuse Detection Model

Detection of intrusions by looking for activity that corresponds to known intrusion techniques or system vulnerabilities. Also known as rules-based detection.

Mockingbird

A computer program or process that mimics the legitimate behavior of a normal system feature (or other apparently useful function) but performs malicious activities once invoked by the user.

Multihost-based Auditing

Audit data from multiple hosts may be used to detect intrusions.




Investigative Data Mining for Security and Criminal Detection
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors: Jesus Mena

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net