Knowledge Base

Home  Search   Show all  Top

Details of the record

titleA comparison of Intrusion Detection systems
authorsE. Biermann, E.Cloete, L.M. Venter
keywordsIntrusion detection systems, security, anomaly detection, misuse detection, security models.
abstractA computer system intrusion is seen as any set of actions that attempt to compromise the integrity, confidentiality
or availability of a resource.1 The introduction of networks and the Internet caused great concern about the protection of sensitive information and have resulted in many computer security research efforts during the past few years. Although preventative techniques such as access control and authentication attempt to prevent intruders, these can fail, and as a second line of defence, intrusion detection has been
introduced. Intrusion detection systems (IDS) are implemented to detect an intrusion as it occurs, and to execute countermeasures when detected. Usually, a security administrator has difficulty in selecting an IDS approach for his unique set-up. In this Report, different approaches to intrusion detection systems are compared, to supply a norm for the best-fit system. The results would assist in the selection of a single appropriate intrusion detection system or combine approaches that best fit any unique computer system.
typeJournal Paper
journalComputers & Security
published year2001
(Total records:1429)
Home  Search   Show all  Top

Powered by: DaDaBIK