作者: Andreas Wespi , Marc Dacier , Hervé Debar
DOI: 10.1007/BF02994844
关键词: Vulnerability assessment 、 Information system 、 Exploit 、 Computer science 、 Knowledge base 、 Secure state 、 Computer security 、 Taxonomy (general) 、 Intrusion detection system 、 Telecommunications network
摘要: Intrusion-detection systems aim at detecting attacks against computer and networks, or in general information systems. Indeed, it is difficult to provide provably secure maintain them such a state during their lifetime utilization. Sometimes, legacy operational constraints do not even allow the definition of fully system. Therefore, intrusion- detection have task monitoring usage detect apparition insecure states. They attempts active misuse, either by legitimate users external parties, abuse privileges exploit security vulnerabilities. In previous paper [Computer networks 31, 805–822 (1999)], we introduced taxonomy that highlights various aspects this area. This extends beyond real- time intrusion include additional monitoring, as vulnerability assessment.