1990
DOI: 10.2172/425295
|View full text |Cite
|
Sign up to set email alerts
|

The architecture of a network level intrusion detection system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
128
0
1

Year Published

2000
2000
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 225 publications
(129 citation statements)
references
References 3 publications
0
128
0
1
Order By: Relevance
“…We add to this de®nition the identi®cation of attempts to use a computer system without authorization or to abuse existing privileges. Our working de®nition matches the one given by Heady et al [15], where an intrusion is de®ned as``any set of actions that attempt to compromise the integrity, con®dentiality, or availability of a resource'', disregarding the success or failure of those actions.…”
Section: Intrusion Detectionmentioning
confidence: 86%
“…We add to this de®nition the identi®cation of attempts to use a computer system without authorization or to abuse existing privileges. Our working de®nition matches the one given by Heady et al [15], where an intrusion is de®ned as``any set of actions that attempt to compromise the integrity, con®dentiality, or availability of a resource'', disregarding the success or failure of those actions.…”
Section: Intrusion Detectionmentioning
confidence: 86%
“…Intrusion Detection is defined as "the problem of identifying individuals who are using a computer system without authorization (i.e., crackers) and those who have legitimate access to the system but are abusing their privileges (i.e., insider attack: threat)" [1]. An Intrusion Detection System gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organization) and misuse (attacks from within the organization).…”
Section: C) Availabilitymentioning
confidence: 99%
“…The intrusion can be caused by inside (legal users), or outside (illegal users) in the system [2]. Nowadays recognition and prevention of intrusion is one of the most important mechanisms that provides security in networks and computer systems, and generally is used as a complemented security for firewalls [3].…”
Section: Intrusion Detection Systemmentioning
confidence: 99%