Intrusion Detection: A Survey

  • Lazarevic A
  • Kumar V
  • Srivastava J
N/ACitations
Citations of this article
141Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This chapter provides the overview of the state of the art in intrusion detection research. Intrusion detection systems are software and/or hardware components that monitor computer systems and analyze events occurring in them for signs of intrusions. Due to widespread diversity and complexity of computer infrastructures, it is difficult to provide a completely secure computer system. Therefore, there are numerous security systems and intrusion detection systems that address different aspects of computer security. This chapter first provides taxonomy of computer intrusions, along with brief descriptions of major computer attack categories. Second, a common architecture of intrusion detection systems and their basic characteristics are presented. Third, taxonomy of intrusion detection systems based on five criteria (information source, analysis strategy, time aspects, architecture, response) is given. Finally, intrusion detection systems are classified according to each of these categories and the most representative research prototypes are briefly described.

Cite

CITATION STYLE

APA

Lazarevic, A., Kumar, V., & Srivastava, J. (2005). Intrusion Detection: A Survey. In Managing Cyber Threats (pp. 19–78). Springer-Verlag. https://doi.org/10.1007/0-387-24230-9_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free