Intrusion detection: a brief history and overview
Top Cited Papers
- 7 August 2002
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Computer
- Vol. 35 (4), supl27-supl30
- https://doi.org/10.1109/mc.2002.1012428
Abstract
The goal of intrusion detection is seemingly simple: to detect intrusions. However, the task is difficult, and in fact intrusion detection systems do not detect intrusions at all, they only identify evidence of intrusions, either while they are in progress or after the fact. The paper considers data collection issues, intrusion detection techniques, system effectiveness and network wide analysis.Keywords
This publication has 7 references indexed in Scilit:
- Detecting computer and network misuse through the production-based expert system toolset (P-BEST)Published by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Detecting anomalous and unknown intrusions against programsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Execution monitoring of security-critical programs in distributed systems: a specification-based approachPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Designing a Web of Highly-Configurable Intrusion Detection SensorsLecture Notes in Computer Science, 2001
- Bro: a system for detecting network intruders in real-timeComputer Networks, 1999
- State transition analysis: a rule-based intrusion detection approachIEEE Transactions on Software Engineering, 1995
- An Intrusion-Detection ModelIEEE Transactions on Software Engineering, 1987