Intrusion Detection Systems

Article Preview

Abstract:

In the ear of information society, network security have become a very important issues. Intrusion is a behavior that tries to destroy confidentiality, data integrality, and data availability of network information. Intrusion detection systems are constructed as a software that automates the automatically detects possible intrusions. In this paper, we present the existing intrusion detection techniques in details including intrusion detection types, firewalls, etc.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

852-855

Citation:

Online since:

July 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] .P. Anderson. Computer Security Threat Monitoring and Surveillance. Technical report, James P. Anderson Co., Fort Washington, PA, April (1980).

Google Scholar

[2] T.H. Ptacek and T.N. Newsham. Insertion, Evasion and Denial of Service: Eluding Network Intrusion Detection. Technical report, Secure Networks, January (1998).

Google Scholar

[3] Helman, P., Liepins, G., and Richards, W. (1992). Foundations of Intrusion Detection. In Proceedings of the Fifth Computer Security Foundations Workshop pp.114-120.

DOI: 10.1109/csfw.1992.236783

Google Scholar

[4] CERT Advisory CA-1997-28, IP Denial of Service Attacks. http: /www. cert. org/advisories/CA-1997-28. html.

Google Scholar

[5] S. Cobb. ICSA Firewall Policy Guide v2. 0., NCSA Security White Paper Series, (1997).

Google Scholar

[6] J. Wack, K. Cutler and J. Pole. Guidelines on Firewalls and Firewall Policy., NIST Recommendations, SP 800-41, January (2002).

DOI: 10.6028/nist.sp.800-41

Google Scholar

[7] Wenke Lee, Salvatore J. Stolfo. Data Mining Approaches for Intrusion Detection. Proceedings of the 7th USENIX Security Symposium. (2000).

Google Scholar

[8] W. Lee, S. J. Stolfo, P.K. Chan, E. Eskin, W. Fan, S. Hershkop M. Miller, and J. Zhang. Real time data mining-based intrusion detection. In DARPA Information Survivability Con-ference and Exposition (DISCEX II'01), Anaheim, California, June (2001).

DOI: 10.1109/discex.2001.932195

Google Scholar