2010
DOI: 10.1108/09685221011079199
|View full text |Cite
|
Sign up to set email alerts
|

A survey of intrusion detection and prevention systems

Abstract: PurposeThe problem of protecting information and data flows has existed from the very first day of information exchange. Various approaches have been devised to protect and transfer such information securely. However, as technology and communications advance and information management systems become more and more powerful and distributed, the problem has taken on new and more complex dimensions and has become a major challenge. The widespread use of wired and wireless communication networks, internet, web appl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
66
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 103 publications
(66 citation statements)
references
References 3 publications
0
66
0
Order By: Relevance
“…IDS are an important tool because its impl anomaly behaviors and apply detection mechanisms to possibly detect unauthorized access or/and behavior that can compromise the system gap in the literature when it comes to understand how to identify the threats they may be facing and how their data need constant protection [1]. Implementing tools and techniques to ensure the integrity, availability, confidentiality, and accountability of the system are essential to the survival of the organization [59]. Observing such activities is crucial in identifying accurate attacks especially when it comes to false negative and positive alerts debated about the anomaly detection dilemma and concluded that alternatives have been elusive.…”
Section: Intrusion Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…IDS are an important tool because its impl anomaly behaviors and apply detection mechanisms to possibly detect unauthorized access or/and behavior that can compromise the system gap in the literature when it comes to understand how to identify the threats they may be facing and how their data need constant protection [1]. Implementing tools and techniques to ensure the integrity, availability, confidentiality, and accountability of the system are essential to the survival of the organization [59]. Observing such activities is crucial in identifying accurate attacks especially when it comes to false negative and positive alerts debated about the anomaly detection dilemma and concluded that alternatives have been elusive.…”
Section: Intrusion Detectionmentioning
confidence: 99%
“…It is understood and expected that all aspects of the infrastructure are protected from any kind of breaches that would target and affect the security, integrity, availability, confidentiality of the organization stored data [59]. When analyzing IDS, its configuration may impair the detection of harmful actions [17].…”
Section: Secured System Developmentmentioning
confidence: 99%
See 1 more Smart Citation
“…The aim of this paper [5] is to address the issues of information security because most of the organizations are depending on the internet to communicate with the people or with the systems to provide them news, online shopping, email, credit card detail and personal information. This paper [5] describes the security needs of an organization to protect their critical information from attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This paper [5] describes the security needs of an organization to protect their critical information from attacks. A well trained staff and analyst are required to continuously monitoring the system.…”
Section: Literature Reviewmentioning
confidence: 99%