A survey of intrusion detection techniques

作者: Teresa F. Lunt

DOI: 10.1016/0167-4048(93)90029-5

关键词:

摘要: Today's computer systems are vulnerable both to abuse by insiders and penetration outsiders, as evidenced the growing number of incidents reported in press. To close all security loopholes from today's is infeasible, no combination technologies can prevent legitimate users abusing their authority a system; thus auditing viewed last line defense. Over past several years, community has been developing automated tools analyze system audit data for suspicious user behavior. This paper describes use such detecting intrusion further that may be detection future.

参考文章(9)
T.F. Lunt, R. Jagannathan, R. Lee, A. Whitehurst, S. Listgarten, Knowledge-based intrusion detection [1989] Proceedings. The Annual AI Systems in Government Conference. pp. 102- 107 ,(1989) , 10.1109/AISIG.1989.47311
J. Picciotto, The Design of an Effective Auditing Subsystem ieee symposium on security and privacy. pp. 13- 13 ,(1987) , 10.1109/SP.1987.10015
Richard R. Linde, Operating system penetration Proceedings of the May 19-22, 1975, national computer conference and exposition on - AFIPS '75. pp. 361- 368 ,(1975) , 10.1145/1499949.1500018
R. H. Irving, C. A. Higgins, F. R. Safayeni, Computerized performance monitoring systems: use and abuse Communications of The ACM. ,vol. 29, pp. 794- 801 ,(1986) , 10.1145/6424.6430
Paul A. Karger, Limiting the Damage Potential of Discretionary Trojan Horses ieee symposium on security and privacy. pp. 32- 32 ,(1987) , 10.1109/SP.1987.10011
T.F. Lunt, Real-time intrusion detection Digest of Papers. COMPCON Spring 89. Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage. pp. 348- 353 ,(1989) , 10.1109/CMPCON.1989.301954
R. Jagannathan, Ann Tamaru, Teresa F. Lunt, Caveh Jalali, Fred Gilham, Peter G. Neumann, IDES: A Progress Report ,(1990)
T.F. Lunt, R. Jagannathan, A prototype real-time intrusion-detection expert system ieee symposium on security and privacy. pp. 59- 66 ,(1988) , 10.1109/SECPRI.1988.8098
R. Jagannathan, Ann Tamaru, Thomas D. Garvey, Teresa F. Lunt, Caveh Jalali, Fred Gilham, Harold S. Javitz, Peter G. Neumann, A REAL-TIME INTRUSION-DETECTION EXPERT SYSTEM (IDES) ,(1992)