作者: A. Hutchison , M. Welz
DOI: 10.1109/FTDCS.1999.818798
关键词: Intrusion detection system 、 Computer security 、 Process (engineering) 、 Computer science 、 Host-based intrusion detection system 、 Order (exchange) 、 Network Access Control 、 Vulnerability (computing) 、 Network security 、 Computer network 、 Anomaly detection
摘要: In this paper we identify a number of security problems encountered in open, untrusted networks and motivate why some these are going to remain with us for the foreseeable future. order reduce system vulnerability such environments, suggest that network services should provide second line defense catch those attackers who not excluded by first line-the conventional signon process. Part fallback position could adapt anomaly detection (a concept borrowed from intrusion systems) means gradually continuously authenticating users modulating their access rights accordingly.