Survey of intrusion detection techniques

被引:171
|
作者
Lunt, Teresa F. [1 ]
机构
[1] SRI Intl, Menlo Park, United States
来源
Computers and Security | 1993年 / 12卷 / 04期
关键词
Security of data;
D O I
10.1016/0167-4048(93)90029-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today's computer systems are vulnerable both to abuse by insiders and to penetration by outsiders, as evidenced by the growing number of incidents reported in the press. To close all security loopholes from today's systems is infeasible, and no combination of technologies can prevent legitimate users from abusing their authority in a system; thus auditing is viewed as the last line of defense. This paper describes the use of such tools for detecting computer system intrusion and describes further technologies that may be of use for intrusion detection in the future.
引用
收藏
页码:405 / 418
相关论文
共 50 条
  • [31] Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure
    Pinto, Andrea
    Luis-Carlos, Herrera
    Donoso, Yezid
    Gutierrez, Jairo A.
    SENSORS, 2023, 23 (05)
  • [32] A Survey of Specification-based Intrusion Detection Techniques for Cyber-Physical Systems
    Nweke, Livinus Obiora
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 37 - 45
  • [33] Artificial intelligent techniques for intrusion detection
    Mukkamala, S
    Sung, AH
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 1266 - 1271
  • [34] Methods and Techniques of Intrusion Detection: A Review
    Somya
    Bansal, Palak
    Ahmad, Tameem
    SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016, 2016, 628 : 518 - 529
  • [35] Graphical techniques in intrusion detection systems
    Gelbord, B
    15TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, PROCEEDINGS, 2001, : 253 - 258
  • [36] Intrusion Detection System: Classification and Techniques
    Soniya, S. Sobin
    Vigila, S. Maria Celestin
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [37] Combining Multiple Techniques for Intrusion Detection
    Katar, Chaker
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (2B): : 208 - 218
  • [38] A Review on Intrusion Detection Systems and Techniques
    Bhati, Nitesh Singh
    Khari, Manju
    Garcia-Diaz, Vicente
    Verdu, Elena
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2020, 28 (Supp02) : 65 - 91
  • [39] Optimal filtering techniques for intrusion detection
    Jha, S
    Kruger, L
    Kurtz, TG
    Lee, Y
    Smith, A
    Wu, ZX
    Signal Processing, Sensor Fusion, and Target Recognition XIV, 2005, 5809 : 578 - 589
  • [40] Recent advances on intrusion detection techniques
    Sun, GY
    Fu, HR
    COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2003, : 83 - 86