Analysis of Intrusion Detection System

Abstract:

Article Preview

Intrusion detection system is an important device of information security. This article describes intrusion detection technology concepts, classifications and universal intrusion detection model, and analysis of the intrusion detection systems weaknesses and limitations. Finally, some directions for future research are addressed.

Info:

Periodical:

Key Engineering Materials (Volumes 460-461)

Edited by:

Yanwen Wu

Pages:

451-454

DOI:

10.4028/www.scientific.net/KEM.460-461.451

Citation:

Y. S. Gu et al., "Analysis of Intrusion Detection System", Key Engineering Materials, Vols. 460-461, pp. 451-454, 2011

Online since:

January 2011

Export:

Price:

$38.00

[1] Yan Xue: Several Methods of the Hacker (Wanfang Data Electronic publishing house, Beijing 2000).

[2] Long Yimin: Network Invasion and Measuring. Computer Project and Science, No. 1 (2001), pp.28-30.

[3] Tang Zhengjun: Design and Realizing of the Intrusion Detection System (Electronic Industry Press, Beijing 2002).

[4] Luo Shoushan: Intrusion Detection System (Beijing University of Post & Telecommunication publishing house, Beijing 2004).

[5] Jin Bo and Lin Jiajun: Summary of Intrusion Detection Technique. Journal of East of China University, Vol. 26, No. 2 (2005), pp.80-82.

[6] Jiang Jianchun and Feng Dengguo: The Principle and Technology of IDS (National defense industry Publishing house, Beijing 2004).

[7] Liu Yi-hong: Research and Implementation of the Intrusion Detection System, Hunan University (2008).

[8] Ding Yong and Yu Ping: Research on Automatic Intrusion Responding System. Computer Science, No. 10 (2003), pp.160-166.

[9] Liu Si-jia: Research on Intelligent Network Intrusion Detection Method, Xihua University (2009).

[10] Lin Guoyuan and Huang Hao: The Evolving Intrusion Detection System. Computer Science, Vol. 135, No. 2 (2008), pp.69-74.

[11] LI Rongxin: Model of Distributed Intrusion Detection System Base on Mobile Agents. Micro-computer Information, Vol. 24, No. 2 (2008), pp.72-74.

In order to see related information, you need to Login.