Intrusion detection: the art and the practice. Part I

作者: Joseph S. Sherif , Rod Ayers , Tommy G. Dearmond

DOI: 10.1108/09685220310489544

关键词:

摘要: Organizations more often than not lack comprehensive security policies and are adequately prepared to protect their systems against intrusions. This paper puts forward a review of state the art applicability intrusion detection models. The also presents classification literature pertaining detection.

参考文章(131)
Yong Tai Tan, Christopher Ting, Tiang Hwee Ong, Chung Pheng Tan, SNMS - Shadow Network Management System. recent advances in intrusion detection. ,(1999)
Nong Ye, A Markov Chain Model of Temporal Behavior for Anomaly Detection information assurance and security. ,(2000)
C.A. Stallings, K.A. Jackson, D.H. DuBois, A phased approach to network intrusion detection ,(1991)
J.L. Thompson, G.G. Christoph, C.A. Stallings, D.D. Simmonds, M.C. Neuman, K.A. Jackson, An automated computer misuse detection system for UNICOS ,(1994)
Eugene H. Spafford, Diego Zamboni, New directions for the AAFID architecture. recent advances in intrusion detection. ,(1999)
G.E. Liepens, H.S. Vaccaro, Intrusion detection: Its role and validation Computers & Security. ,vol. 11, pp. 347- 355 ,(1992) , 10.1016/0167-4048(92)90175-Q
Aaron Schwartzbard, Anup K. Ghosh, A study in using neural networks for anomaly and misuse detection usenix security symposium. pp. 12- 12 ,(1999)