This HTML5 document contains 27 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dcthttp://purl.org/dc/terms/
dbohttp://dbpedia.org/ontology/
n16https://web.archive.org/web/20070427040753/http:/citeseer.ist.psu.edu/
foafhttp://xmlns.com/foaf/0.1/
n9https://global.dbpedia.org/id/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
freebasehttp://rdf.freebase.com/ns/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n11http://www.cl.cam.ac.uk/~rnc1/
wikipedia-enhttp://en.wikipedia.org/wiki/
dbchttp://dbpedia.org/resource/Category:
provhttp://www.w3.org/ns/prov#
dbphttp://dbpedia.org/property/
xsdhhttp://www.w3.org/2001/XMLSchema#
wikidatahttp://www.wikidata.org/entity/
goldhttp://purl.org/linguistics/gold/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Extrusion_Detection
dbo:wikiPageWikiLink
dbr:Extrusion_detection
dbo:wikiPageRedirects
dbr:Extrusion_detection
Subject Item
dbr:Extrusion_detection
rdf:type
dbo:Organisation
rdfs:label
Extrusion detection
rdfs:comment
Extrusion detection or outbound intrusion detection is a branch of intrusion detection aimed at developing mechanisms to identify successful and unsuccessful attempts to use the resources of a computer system to compromise other systems. Extrusion detection techniques focus primarily on the analysis of system activity and outbound traffic in order to detect malicious users, malware or network traffic that may pose a threat to the security of neighboring systems.
dct:subject
dbc:Data_security
dbo:wikiPageID
7293292
dbo:wikiPageRevisionID
1109837314
dbo:wikiPageWikiLink
dbr:Intrusion_detection dbr:Computer_system dbr:Router_(computing) dbr:Malware dbc:Data_security
dbo:wikiPageExternalLink
n11:extrusion.pdf n16:mandujano04outbound.html
owl:sameAs
wikidata:Q5422493 n9:4jasS freebase:m.025yfbm
dbp:wikiPageUsesTemplate
dbt:Orphan
dbo:abstract
Extrusion detection or outbound intrusion detection is a branch of intrusion detection aimed at developing mechanisms to identify successful and unsuccessful attempts to use the resources of a computer system to compromise other systems. Extrusion detection techniques focus primarily on the analysis of system activity and outbound traffic in order to detect malicious users, malware or network traffic that may pose a threat to the security of neighboring systems. While intrusion detection is mostly concerned about the identification of incoming attacks (intrusion attempts), extrusion detection systems try to prevent attacks from being launched in the first place. They implement monitoring controls at leaf nodes of the network—rather than concentrating them at choke points, e.g., routers—in order to distribute the inspection workload and to take advantage of the visibility a system has of its own state. The ultimate goal of extrusion detection is to identify attack attempts launched from an already compromised system in order to prevent them from reaching their target, hereby containing the impact of the threat.
gold:hypernym
dbr:Branch
prov:wasDerivedFrom
wikipedia-en:Extrusion_detection?oldid=1109837314&ns=0
dbo:wikiPageLength
1475
foaf:isPrimaryTopicOf
wikipedia-en:Extrusion_detection
Subject Item
dbr:Outbound_Intrusion_Detection
dbo:wikiPageWikiLink
dbr:Extrusion_detection
dbo:wikiPageRedirects
dbr:Extrusion_detection
Subject Item
wikipedia-en:Extrusion_detection
foaf:primaryTopic
dbr:Extrusion_detection