منابع مشابه
A taxonomy of intrusion response systems
Recent advances in the field of intrusion detection brought new requirements to intrusion prevention and response. Traditionally, the response to an attack is manually triggered by an administrator. However, increased complexity and speed of the attack-spread during recent years show acute necessity for complex dynamic response mechanisms. Although intrusion detection systems are being actively...
متن کاملTowards a taxonomy of intrusion-detection systems
Intrusion detection systems aim at detecting attacks against computer systems and networks or against information systems in general as it is di cult to provide provably secure information systems and maintain them in such a secure state for their entire lifetime and for every utilization Sometimes legacy or operational con straints do not even allow a fully secure information system to be real...
متن کاملIntrusion Detection Systems: A Survey and Taxonomy
This paper presents a taxonomy of intrusion detection systems that is then used to survey and classify a number of research prototypes. The taxonomy consists of a classification first of the detection principle, and second of certain operational aspects of the intrusion detection system as such. The systems are also grouped according to the increasing difficulty of the problem they attempt to a...
متن کاملIntrusion Detection Systems: Threats, Taxonomy, Tuning
THREATS An intrusion is defined as any set of actions that attempts to compromise the integrity, the confidentiality, or the availability of a resource. Following the pioneering work of Anderson in 1980 it has been recognised that while computer systems and networks need to be protected from unauthorised external access, using firewalls for example, it is not possible to provide an unconditiona...
متن کاملA Survey and Taxonomy of Lightweight Intrusion Detection Systems
Internet and computer networks are exposed to an ever increasing number of security threats that can damage computer systems and communication channels. Firewalls are used to defend systems but still they are not enough to provide full protection to the systems. Then, the concern with Intrusion Detection Systems (IDSs) has been growing for network security over the past years. Due to the increa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information and Computer Security
سال: 2007
ISSN: 1744-1765,1744-1773
DOI: 10.1504/ijics.2007.012248