Current approaches to detecting intrusions

نویسندگان

  • Luis J. Gonzalez
  • LUIS J. GONZALEZ
چکیده

Before the flourishing of the Internet, computers were limited to the walls of the organization where computers were linked to each other but had little contact with computer systems outside. Now, we can reach farther, and can expose and link our computers to the entire world; however, such capabilities have made our privacy and assets vulnerable to cyber space attackers. Fortunately, attacks can be repelled with the implementation of Intrusion Detection Systems (IDS) and Incident Response Strategies. However, existent intrusion detection systems are generally restricted in their monitoring functionally. This paper analyzes current approaches to detecting intrusions and comments on how weaknesses of existent models can be improved. Content indicators Design; Legal Aspects; Security; Intrusion Detection; IDS; Intruder Tracking; Intrusion, Detection Systems, Model-Based Systems ________________________________________________________________________

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion and Anomaly Detection in Wireless Networks

The broadcast nature of wireless networks and the mobility features created new kinds of intrusions and anomalies taking profit of wireless vulnerabilities. Because of the radio links and the mobile equipment features of wireless networks, wireless intrusions are more complex because they add to the intrusions developed for wired networks, a large spectrum of complex attacks targeting wireless ...

متن کامل

Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams

Intrusion detection has become a widely studied topic in computer security in recent years. Anomaly detection is an intensive focus in intrusion detection research because of its capability of detecting unknown attacks. Current anomaly IDSs (Intrusion Detection System) have some difficulties for practical use. First, a large amount of precisely labeled data is very difficult to obtain in practi...

متن کامل

Recent trend in Intrusion detection using Fuzzy- Genetic algorithm

Computer networks have expanded significantly in use and this makes them more vulnerable to attacks. It is really important to secure the data from any intrusive attacks so intrusion detection is really very helpful in the field of computer network security. Intrusion detection is the act of detecting unwanted traffic on a network. Many current intrusion detection systems are unable to find unk...

متن کامل

Detecting Anomalous and Unknown Intrusions Against Programs

The ubiquity of the Internet connection to desktops has been both boon to business as well as cause for concern for the security of digital assets that may be unknowingly exposed. Firewalls have been the most commonly deployed solution to secure corporate assets against intrusions, but rewalls are vulnerable to errors in con guration, ambiguous security policies, data-driven attacks through all...

متن کامل

Embedded Monitors for Detecting and Preventing Intrusions in Cryptographic and Application Protocols

Intrusion Detection Systems (IDS) are responsible detecting intrusions in order to protect information from unauthorized access or manipulation. There are two main approaches for intrusion detection: signature-based and anomaly-based. Signature-based detection employs pattern matching to match attack signatures with observed data making it ideal for detecting known attacks. However, it cannot d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002