PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Intrusion detection systems: the fundamentals, problems and the way forward

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Intrusion detection systems become very important computer security mechanisms as computer break-ins are getting more common everyday. Intrusion detection system (IDS) monitors computers and networks for any set of actions that attempt to compromise the integrity, confidentiality or availability of computer resources. The goal of this paper is to discuss the fundamentals of IDS and to create awareness on why IDS should be embraced. A users study was carried out to understand the perceptions of individuals: organisations and companies on the use of IDS. Summary of problems of en/rent IDS designs and the challenges ahead are presented. We also look tit what should be the new approaches or future directions m IDS design so as to eliminate these shortcomings.
Rocznik
Strony
83--95
Opis fizyczny
Bibliogr. 19 poz.
Twórcy
autor
  • Mathematical Sciences Departament, University of Agroculture, Abeokuta, Nigeria
  • Computer Science Department, University of Lagos, Lagos, Nigeria
Bibliografia
  • 1. [AXE99] Axelsson S: The base-rate fallacy and its implications for intrusion detection. In Proceeding of the 6th ACM Conference on Computer and Communications Security, Knt Ridge Digital Labs, Singapore, November 1-4, 1999.
  • 2. [Bel89] Bellovin S. M.: Security problems in the tcp/ip protocol suite. Computer communication Review, 19(2): 32-48, April 1989.
  • 3. [FHSL96] Forrest S., Hofmeyr S. A., Somayaji A., Longstaff. T. A.: A sense of self for Unix processes. In Proceedings of the 1996 IEEE Symposium on research in Security and Privacy, pp. 120-128. IEEE Computer Society Press, 1996.
  • 4. [GM84] Gramp F.T., Morris R. H.: Unix system security. AT&T Bell Laboratories Technical Journal, 63(8): 1649-1672, October 1984.
  • 5. [HA93] Stephen E. Hansen and E. Todd Atkins. Automated system monitoring and notification with swatch. In Proceedings of the seventh Systems Administration conference [LISA’93], Monterey, CA, November 1993.
  • 6. [JV94] Javitz H. S., Valdes A.: The NIDES statistical component: Description and justification. Technical report, SRI Computer Science Laboratory, Menlo Park C.A. March 1994. Available for download at: http:/ /www.sdl.sri.com/nides/index5.html.
  • 7. [KRL97] Ko C., Ruschitzka M., Levitt K.: Execution monitoring of security-critical programs in distributed systems: A specification based approach. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, Oakland, California, 1997. 
  • 8. [KS94] Kumar S., Spafford E.H.: A pattern matching model for misuse intrusion detection. In Proceedings of the 17th National Computer Security Conference, pp. 11-21, Baltimore, MD, October 1994.
  • 9. [Kum95] Kumar S.: Classification and detection of computer intrusions. PhD thesis, Purdue University, West Lafayette, Indiana, August 1995.
  • 10. [LB98] Lane T., Brodley C. E.: Temporal sequence learning and data reduction for anomaly detection. In Proceedings of the 5th Conference on Computer & Communications Security, pp. 150-158, San Francisco, CA, USA, November 2-5 1998. ACM, ACM Special Interest Group.
  • 11. [LJ02] Lundin E., Jonsson E.: Survey of Intrusion Detection Research. In technical report No 02-04 of Depart of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden, 2002.
  • 12. [LLG93] Ilgun K.: USTAT: A real-time intrusion detection system for UNIX. In Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, pp. 16-28, Oakland, CA, 1993.
  • 13. [LP99] Linquist U., Porras P. A.: Detecting computer and Network Misuse Through the Production Based Expert System Toolset (P-BEST). IEEE proceedings. May, 1999.
  • 14. [LSM99] Lee W., Stolfo S. L, Mov K.W.: Adaptive intrusion detection: a data mining approach. Artificial Intelligence Review, 1999.
  • 15. [MAR99] Martino S.: “A Mobile Agent Approach for Intrusion Detection”, Joint Research Centre-Institute for Systems, Informatics and Safety. Italy, June 1999.
  • 16. [MCA00] Mitlugh J., Chrishe A., Allen J.: The role of intrusion detection systems. IEEE software journal. September/October 2002
  • 17. [MOU97] Mounji A.: Languages and Tools for rule-Based Distributed Intrusion Detection. PhD thesis, Facult’e Universitaire Notre de la Paix de Namur, Belgium, September 1997.
  • 18. [ME98] Me L.: GASSATA, a genetic algorithm as an alternative tool for security audit trails analysis. In Proceedings of the First International Workshop on the Recent Advances in Intrusion Detection, Louvain-la-Neuve, Belgium, September 1998. Available at: www.Zurich.ibm.com/dac/Proii RAID98/Ful[.Papers /gassata.paper.p
  • 19. [PAX98] Paxon V. Bro: A system for detecting network intruders in realtime. In Proceedings of the Seventh USENIX Security Symposium, pp. 31-51, San Antonio, Texas, January 1998. USENIX
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-LOD7-0027-0073
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.