Intrusion Detection: Challenges and Current Solutions
نویسنده
چکیده
The problem of intrusion has been a long standing computer security challenge. With governments and institutes relying more on computer networks it is becoming essential to arm networks with defenses against intrusion and misuse. Such intrusions include installing harmful viruses, spreading worms, initiating distributed attacks, and misuse by authorized users. To defend against these attacks, systems can utilize anomaly detection and pattern matching against known attacks to detect intrusions. These intrusion detection systems have rapidly evolved since their introduction in the 1980s. This paper discusses some of the challenges and threats that face intrusion detection systems followed by a survey of several systems currently available.
منابع مشابه
A Review of Intrusion Detection Defense Solutions Based on Software Defined Network
Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review...
متن کاملPRIDE: A practical intrusion detection system for resource constrained wireless mesh networks
As interest in wireless mesh networks grows, security challenges, e.g., intrusion detection, become of paramount importance. Traditional solutions for intrusion detection assign full IDS responsibilities to a few selected nodes. Recent results, however, have shown that a mesh router cannot reliably perform full IDS functions because of limited resources (i.e., processing power and memory). Coop...
متن کاملTitle : Alert Correlation in Collaborative Intelligent Intrusion
As complete prevention of computer attacks is not possible, intrusion detection systems (IDSs) play a very important role in minimizing the damage caused by different computer attacks. There are two intrusion detection methods: namely misuseand anomaly-based. A collaborative intelligent intrusion detection system (CIIDS) is proposed to include both methods, since it is concluded from recent res...
متن کاملResearch challenges in lightweight intrusion detection for wireless sensor networks
This short paper discusses our work in progress on intrusion detection (ID) in wireless sensor networks (sensornets). Its major goals are threefold. First, we discuss characteristics and vulnerabilities of sensornets that make necessary designing ID solutions specialized for sensornets. Second, we identify research challenges in ID for sensornets. Third, we propose initial ID solutions that exp...
متن کاملIntrusion Detection and Correlation - Challenges and Solutions
No wonder you activities are, reading will be always needed. It is not only to fulfil the duties that you need to finish in deadline time. Reading will encourage your mind and thoughts. Of course, reading will greatly develop your experiences about everything. Reading intrusion detection and correlation challenges and solutions is also a way as one of the collective books that gives many advant...
متن کامل