Tytuł artykułu
Autorzy
Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Efficiency of the Intrusion Detection Systems (IDS) mainly depends on their organizational, technical and functional structures, i.e. from the implemented of the system architecture. The fact, that in the designing process of several IDS different models were used, resulted in lack, of co-operation between those systems in complex computer systems environment. At this stage, as a natural consequence, R&D efforts were undertaken aimed at creation of a common model of the IDS architecture. This paper presents an assessment of those efforts as well as relevant proposals of the author.
Słowa kluczowe
Rocznik
Tom
Strony
57--67
Opis fizyczny
Bibliogr. 9 poz., rys.
Twórcy
autor
- Instytut Informatyki, Akademia Podlaska
Bibliografia
- [1] Amaroso E.G.: Intrusion Detection. An Introduction to Internet Surveillance, Correlation, Traps, Trace Back and Response. AT&T Laboratories 1999.
- [2] Proceedings of the Symposium on Network and Distributed System Security. San Diego, 1995.
- [3] Barczak A., Sydoruk T.: Bezpieczeństwo systemów informatycznych. Akademia Podlaska, Siedlce 2002.
- [4] Denning D.: Proceedings of the IEEE Symposium on Security and Privacy. „An Intrusion-Detection Model”. Oakland, 1986.
- [5] http://seclab. cs. ucdavis. edu/cidf/
- [6] Neumann P.: Computer-Related Risk Addison-Wesley, 1995.
- [7] Porras Ph., Neumann P.: Proceedings of the National Security Conference. EMERALD. Baltimore, 1997.
- [8] Proceedings of the First Invitational Workshop, Research and Development for Infrastructure Assurance/Information Warfare-Defend. Institute for Defense Analysis, Alexandria-Wirginia, 1997.
- [9] http://www.nfr.net/publications/
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-597ac769-dee6-4ca6-be06-2e46eb7b9380