A Comparative Analysis of Current Intrusion Detection Technologies

作者: Jay Harrell , James Cannady

DOI:

关键词: Intrusion prevention systemComputer scienceComputer securityFocus (computing)Anomaly-based intrusion detection systemIntrusion detection system

摘要: Intrusion detection is a significant focus of research in the security computer systems and networks. This paper presents an analysis progress being made development effective intrusion for distributed The technologies which are discussed designed to detect instances access by unauthorized individuals misuse system resources authorized users. A review foundations methodologies current efforts discussed. results informal survey network professionals offer real-world view detection. Finally, discussion future promise enhance ability intrusions provided.

参考文章(15)
Debra Anderson, Thane Frivold, Alfonso Valdes, Next-generation Intrusion Detection Expert System (NIDES)A Summary ,(1997)
N. McAuliffe, D. Wolcott, L. Schaefer, N. Kelem, B. Hubbard, T. Haley, Is your computer being misused? A survey of current intrusion detection system technology annual computer security applications conference. pp. 260- 272 ,(1990) , 10.1109/CSAC.1990.143785
G.B. White, E.A. Fisch, U.W. Pooch, Cooperating security managers: a peer-based intrusion detection system IEEE Network. ,vol. 10, pp. 20- 23 ,(1996) , 10.1109/65.484228
S.E. Smaha, Haystack: an intrusion detection system annual computer security applications conference. pp. 37- 44 ,(1988) , 10.1109/ACSAC.1988.113412
H.S. Vaccaro, G.E. Liepins, Detection of anomalous computer session activity ieee symposium on security and privacy. pp. 280- 289 ,(1989) , 10.1109/SECPRI.1989.36302
S.W. Shieh, V.D. Gligor, A pattern-oriented intrusion-detection model and its applications ieee symposium on security and privacy. pp. 327- 342 ,(1991) , 10.1109/RISP.1991.130800
P.A. Porras, R.A. Kemmerer, Penetration state transition analysis: A rule-based intrusion detection approach annual computer security applications conference. pp. 220- 229 ,(1992) , 10.1109/CSAC.1992.228217
T.F. Lunt, Real-time intrusion detection Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage. pp. 348- 353 ,(1989) , 10.1109/CMPCON.1989.301954