Survey of Intrusion Detection Research

作者: Emilie Lundin , Erland Jonsson

DOI:

关键词:

摘要: The literature holds a great deal of research in the intrusion detection area. Much this describes design and implementation specific systems. While main focus has been study different algorithms methods, there are number other issues that equal importance to make these systems function well practice. I believe reason commercial market does not use many ideas described is still too unresolved issues. This survey focuses on presenting must be addressed build fully functional practically usable (IDSs). It points out state art each area suggests important open issues.

参考文章(51)
Emilie Lundin, Erland Jonsson, Privacy vs. Intrusion Detection Analysis. recent advances in intrusion detection. ,(1999)
Stephen E. Smaha, Daniel M. Teal, Steven R. Snapp, Tim Grance, The {DIDS} (Distributed Intrusion Detection System) Prototype usenix summer technical conference. ,(1992)
Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava, Intrusion detection: a survey ICCC '95 Proceedings of the 12th international conference on computer communication on Information highways : for a smaller world and better living: for a smaller world and better living. pp. 409- 414 ,(1996)
Midori Asaka, Shunji Okazawa, Atsushi Taguchi, Shigeki Goto, A method of tracing intruders by use of mobile agents Proc. INET'99. ,(1999)
Peter G. Neumann, Phillip A. Porras, Experience with EMERALD to Date ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 73- 80 ,(1999)
Tom Karygiannis, Peter Mell, Wayne Jansen, Don Marks, Applying Mobile Agents to Intrusion Detection and Response ,(1999)
M. Bishop, A standard audit trail format National information systems security conference, Baltimore, MD (United States), 10-13 Oct 1995. ,(1995)