If you're worried that computers are unassailable, fear not: It turns out that computers need watchdogs, too. But instead of an angry, barking dog, they depend on programs keyed to troll through important databases to look for suspicious signs of entry. Researchers at Pennsylvania State University have tested and ranked three nonstatistical, data mining methods that classify and detect telltale, patterns of entry and misuse left by typical computer network intruders. The best method the researchers found for foiling computer hackers is called rough sets, although they say that means of protecting networks is largely overlooked by the network-security industry. The researchers say that computer security breaches have risen significantly in the last three years.
展开▼