Analysis of Intrusion Detection System

Article Preview

Abstract:

Intrusion detection system is an important device of information security. This article describes intrusion detection technology concepts, classifications and universal intrusion detection model, and analysis of the intrusion detection systems weaknesses and limitations. Finally, some directions for future research are addressed.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 460-461)

Pages:

451-454

Citation:

Online since:

January 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yan Xue: Several Methods of the Hacker (Wanfang Data Electronic publishing house, Beijing 2000).

Google Scholar

[2] Long Yimin: Network Invasion and Measuring. Computer Project and Science, No. 1 (2001), pp.28-30.

Google Scholar

[3] Tang Zhengjun: Design and Realizing of the Intrusion Detection System (Electronic Industry Press, Beijing 2002).

Google Scholar

[4] Luo Shoushan: Intrusion Detection System (Beijing University of Post & Telecommunication publishing house, Beijing 2004).

Google Scholar

[5] Jin Bo and Lin Jiajun: Summary of Intrusion Detection Technique. Journal of East of China University, Vol. 26, No. 2 (2005), pp.80-82.

Google Scholar

[6] Jiang Jianchun and Feng Dengguo: The Principle and Technology of IDS (National defense industry Publishing house, Beijing 2004).

Google Scholar

[7] Liu Yi-hong: Research and Implementation of the Intrusion Detection System, Hunan University (2008).

Google Scholar

[8] Ding Yong and Yu Ping: Research on Automatic Intrusion Responding System. Computer Science, No. 10 (2003), pp.160-166.

Google Scholar

[9] Liu Si-jia: Research on Intelligent Network Intrusion Detection Method, Xihua University (2009).

Google Scholar

[10] Lin Guoyuan and Huang Hao: The Evolving Intrusion Detection System. Computer Science, Vol. 135, No. 2 (2008), pp.69-74.

Google Scholar

[11] LI Rongxin: Model of Distributed Intrusion Detection System Base on Mobile Agents. Micro-computer Information, Vol. 24, No. 2 (2008), pp.72-74.

Google Scholar