作者: Dominique Alessandri
DOI:
关键词: Architecture 、 The Internet 、 Computer science 、 Computer security 、 Anomaly-based intrusion detection system 、 Intrusion prevention system 、 Security policy 、 Taxonomy (general) 、 Deliverable 、 Intrusion detection system
摘要: In recent years, an increasing number of intrusion-detection systems (IDSes) have become available [Sobire98]. This development has been driven, among other things, by the growing computer security incidents [CIN0799, Gross97, Howard97, Kumar95, LSMTTF98, Neuman98b, NeuPar89] which highlighted need for organizations to protect their networks against adversaries [Sundar96]. The issue protecting and making them secure reliable addressed in many publications, analyzed problems made pertinent recommendations [BeGlRa98, Neuman98]. Intrusion detection (ID) is widely regarded as being part solution today’s networks. However, generating false alarms or not recognizing attacks, IDSes may fail. This, together with fact that are only distributed but also highly heterogeneous, makes it desirable deploy multiple instances diverse order achieve adequate protection such Last least, ID architecture embodying compliance organization’s policy should itself be tolerant intrusions. Project IST-1999-11583 Maliciousand Accidental-Fault Tolerance Internet Applications Towards a Taxonomy Detection Systems Attacks MAFTIA deliverable D3