作者: Christian Bitter , John North , David A. Elizondo , Tim Watson
DOI: 10.1007/978-3-642-25237-2_2
关键词:
摘要: Modern Society is becoming increasingly dependent upon ever-more complex systems. We are in a situation where security breach can have an impact on individuals, institutions and critical services, such as power communication This reliance, along with the possibility of remaining both anonymous geographically separate from intrusion, has made cyber-crime attractive arena for criminals. To protect their assets organisations use multi-layered approach to security. As well other areas access control, systems which detect if malicious or unauthorised activity occurring more prevalent; intrusion detection at centre this. Of particular benefit any technique potential identify previously unseen patterns, neural networks. chapter concerned state-of-the-art using networks, part system, suspicious traffic. examine host based (where all information gathered single host) network cross section different types networks application differing detection.