Towards a Taxonomy of Intrusion Detection Systems and Attacks

作者: Dominique Alessandri

DOI:

关键词: ArchitectureThe InternetComputer scienceComputer securityAnomaly-based intrusion detection systemIntrusion prevention systemSecurity policyTaxonomy (general)DeliverableIntrusion detection system

摘要: In recent years, an increasing number of intrusion-detection systems (IDSes) have become available [Sobire98]. This development has been driven, among other things, by the growing computer security incidents [CIN0799, Gross97, Howard97, Kumar95, LSMTTF98, Neuman98b, NeuPar89] which highlighted need for organizations to protect their networks against adversaries [Sundar96]. The issue protecting and making them secure reliable addressed in many publications, analyzed problems made pertinent recommendations [BeGlRa98, Neuman98]. Intrusion detection (ID) is widely regarded as being part solution today’s networks. However, generating false alarms or not recognizing attacks, IDSes may fail. This, together with fact that are only distributed but also highly heterogeneous, makes it desirable deploy multiple instances diverse order achieve adequate protection such Last least, ID architecture embodying compliance organization’s policy should itself be tolerant intrusions. Project IST-1999-11583 Maliciousand Accidental-Fault Tolerance Internet Applications Towards a Taxonomy Detection Systems Attacks MAFTIA deliverable D3

参考文章(44)
Andrew Harrison Gross, Analyzing computer intrusions University of California at San Diego. ,(1998)
John F. Farrell, S. Jeff Turner, Peter A. Loscocco, Ruth C. Taylor, Stephen D. Smalley, Patrick A. Muckelbauer, The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments ,(2000)
Julia Swannell, The oxford modern english dictionary : Clarendon press. ,(1992)
Sandeep Kumar, Classification and detection of computer intrusions Purdue University. ,(1996)
Eugene H. Spafford, Ivan Krsul, Taimur Aslam, Use of A Taxonomy of Security Faults ,(1996)