Survey of intrusion detection techniques

被引:171
|
作者
Lunt, Teresa F. [1 ]
机构
[1] SRI Intl, Menlo Park, United States
来源
Computers and Security | 1993年 / 12卷 / 04期
关键词
Security of data;
D O I
10.1016/0167-4048(93)90029-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today's computer systems are vulnerable both to abuse by insiders and to penetration by outsiders, as evidenced by the growing number of incidents reported in the press. To close all security loopholes from today's systems is infeasible, and no combination of technologies can prevent legitimate users from abusing their authority in a system; thus auditing is viewed as the last line of defense. This paper describes the use of such tools for detecting computer system intrusion and describes further technologies that may be of use for intrusion detection in the future.
引用
收藏
页码:405 / 418
相关论文
共 50 条
  • [1] A survey of intrusion detection techniques in Cloud
    Modi, Chirag
    Patel, Dhiren
    Borisaniya, Bhavesh
    Patel, Hiren
    Patel, Avi
    Rajarajan, Muttukrishnan
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 42 - 57
  • [2] A Survey on Intrusion Detection Techniques in MANET
    Soni, Mohit
    Ahirwar, Manish
    Agrawal, Shikha
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1027 - 1032
  • [3] A Survey on Intrusion Detection Techniques in MANET
    20163702795437
    (1) Department of Computer Science and Engineering, University Institute of Technology, Bhopal, India, 1600, (Institute of Electrical and Electronics Engineers Inc., United States):
  • [4] Intrusion detection techniques in cloud environment: A survey
    Mishra, Preeti
    Pilli, Emmanuel S.
    Varadharajan, Vijay
    Tupakula, Udaya
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 : 18 - 47
  • [5] A Survey: Intrusion Detection Techniques for Internet of Things
    Choudhary, Sarika
    Kesswani, Nishtha
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (01) : 86 - 105
  • [6] Survey of intrusion detection systems: techniques, datasets and challenges
    Ansam Khraisat
    Iqbal Gondal
    Peter Vamplew
    Joarder Kamruzzaman
    Cybersecurity, 2
  • [7] Survey of intrusion detection systems: techniques, datasets and challenges
    Khraisat, Ansam
    Gondal, Iqbal
    Vamplew, Peter
    Kamruzzaman, Joarder
    CYBERSECURITY, 2019, 2 (01)
  • [8] A survey of intrusion detection from the perspective of intrusion datasets and machine learning techniques
    Singh G.
    Khare N.
    International Journal of Computers and Applications, 2022, 44 (07) : 659 - 669
  • [9] A survey of intrusion detection techniques based on negative selection algorithm
    Kuldeep Singh
    Lakhwinder Kaur
    Raman Maini
    International Journal of System Assurance Engineering and Management, 2022, 13 : 175 - 185
  • [10] A Survey of Intrusion Detection Techniques for Cyber-Physical Systems
    Mitchell, Robert
    Chen, Ing-Ray
    ACM COMPUTING SURVEYS, 2014, 46 (04)