The document discusses user behavior profiling in computer security, focusing on intrusion detection systems (IDS) that monitor user activity to identify harmful behavior. It compares misuse detection, which relies on known attack signatures, with anomaly detection (AD), which identifies novel intrusions based on deviations from established user behavior profiles. While AD offers advantages in discovering unknown threats, it faces challenges such as false alarms and difficulty in classifying detected intrusions.
Related topics: