Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
DOI: 10.1109/enabl.2002.1029998
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion detection: systems and models

Abstract: Organizations more often than not lack comprehensive security policies and are not adequately prepared to protect their systems against intrusions. This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classification of literature pertaining to intrusion detection.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 81 publications
0
15
0
Order By: Relevance
“…between internetintranet, between users-servers etc. ), usage of network vulnerability scanners to double check firewalls and to find security holes that intruders can exploit, usage of host policy scanners to make sure they conform to accepted security practices and finally usage of symbiosis of NIDS, other packet sniffing utilities and host-based virus scanners to flag successful intrusions may significantly improve the overall level of information security of web-based system [2]. Most of modern intrusion detection methods are directed to the proactive analysis of the already conducted attacks and to the creation of new rule sets for detection of next attack of the same type on the basis of the previously generated rules.…”
Section: Web-based System Securitymentioning
confidence: 99%
“…between internetintranet, between users-servers etc. ), usage of network vulnerability scanners to double check firewalls and to find security holes that intruders can exploit, usage of host policy scanners to make sure they conform to accepted security practices and finally usage of symbiosis of NIDS, other packet sniffing utilities and host-based virus scanners to flag successful intrusions may significantly improve the overall level of information security of web-based system [2]. Most of modern intrusion detection methods are directed to the proactive analysis of the already conducted attacks and to the creation of new rule sets for detection of next attack of the same type on the basis of the previously generated rules.…”
Section: Web-based System Securitymentioning
confidence: 99%
“…If the IPS fails to do the required actions, the Intrusion Detection System (IDS) would attempt to detect the said intrusion. The detection system is capable of detecting any keywords used which depicts the nature of the bully or the act of bullying [25,26]. By identifying intrusions through misuse (well-defined attacks / specific actions being performed on specific objects with known weak points), anomaly (activity deviations from what is considered normal usage patterns) or hybrid (a combination of both misuse and anomaly intrusions), IDS systems are able to detect any form of bullying activity [27].…”
Section: Existing Cyberbullying Detection Approachesmentioning
confidence: 99%
“…Since the development of time-sharing systems in the 1960's the need for computer security has been recognized and studied [10,30,36,31,32] and has lead to the development of a variety of security systems and approaches. Initial systems developed during the 1960's and 1970's focused on prevention by attempting to deny access to unauthorized resources [10,36].…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
“…Initial systems developed during the 1960's and 1970's focused on prevention by attempting to deny access to unauthorized resources [10,36]. For example: a user identification and password that would prevent unauthorized individuals from logging onto the system.…”
Section: Intrusion Detection Systemsmentioning
confidence: 99%
See 1 more Smart Citation