Survey of intrusion detection techniques

被引:171
|
作者
Lunt, Teresa F. [1 ]
机构
[1] SRI Intl, Menlo Park, United States
来源
Computers and Security | 1993年 / 12卷 / 04期
关键词
Security of data;
D O I
10.1016/0167-4048(93)90029-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today's computer systems are vulnerable both to abuse by insiders and to penetration by outsiders, as evidenced by the growing number of incidents reported in the press. To close all security loopholes from today's systems is infeasible, and no combination of technologies can prevent legitimate users from abusing their authority in a system; thus auditing is viewed as the last line of defense. This paper describes the use of such tools for detecting computer system intrusion and describes further technologies that may be of use for intrusion detection in the future.
引用
收藏
页码:405 / 418
相关论文
共 50 条
  • [21] Intrusion detection techniques and approaches
    Verwoerd, T
    Hunt, R
    COMPUTER COMMUNICATIONS, 2002, 25 (15) : 1356 - 1365
  • [22] Intrusion Detection in Water Distribution Systems using Machine Learning Techniques: A Survey
    Mabunda, Hlayisani D.
    Ramotsoela, Daniel T.
    Abu-Mahfouz, Adnan M.
    2022 IEEE 31ST INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2022, : 418 - 423
  • [23] A Survey of Feature Selection Techniques in Intrusion Detection System: A Soft Computing Perspective
    Varma, P. Ravi Kiran
    Kumari, V. Valli
    Kumar, S. Srinivas
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 785 - 793
  • [24] Network intrusion detection system: A survey on artificial intelligence-based techniques
    Habeeb, Mohammed Sayeeduddin
    Babu, T. Ranga
    EXPERT SYSTEMS, 2022, 39 (09)
  • [25] A Survey of Intrusion Detection System
    Dali, Loubna
    Abouelmehdi, Karim
    Bentajer, Ahmed
    Elsayed, Hoda
    Elmoutaoukkil, Abdelmajid
    Eladnani, Fatiha
    Benihssane, Abderahim
    2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
  • [26] A Survey on Intrusion Detection Tools
    Bhati, Bhoopesh Singh
    Rai, C. S.
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 806 - 810
  • [27] Adaptation techniques for intrusion detection and intrusion response systems
    Ragsdale, DJ
    Carver, CA
    Humphries, JW
    Pooch, UW
    SMC 2000 CONFERENCE PROCEEDINGS: 2000 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOL 1-5, 2000, : 2344 - 2349
  • [28] False alarm minimization techniques in signature-based intrusion detection systems: A survey
    Hubballi, Neminath
    Suryanarayanan, Vinoth
    COMPUTER COMMUNICATIONS, 2014, 49 : 1 - 17
  • [29] Machine Learning Techniques for Network-based Intrusion Detection System: A Survey Paper
    Ahmed, Lubna Ali Hassan
    Hamad, Yahia Abdalla Mohamed
    2021 IEEE NATIONAL COMPUTING COLLEGES CONFERENCE (NCCC 2021), 2021, : 1024 - +
  • [30] Exploring Lightweight Deep Learning Techniques for Intrusion Detection Systems in IoT Networks: A Survey
    Hassan, Hind Ali abdul
    Zolfy, Mina
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (04) : 1944 - 1958