Survey of intrusion detection techniques

被引:171
|
作者
Lunt, Teresa F. [1 ]
机构
[1] SRI Intl, Menlo Park, United States
来源
Computers and Security | 1993年 / 12卷 / 04期
关键词
Security of data;
D O I
10.1016/0167-4048(93)90029-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today's computer systems are vulnerable both to abuse by insiders and to penetration by outsiders, as evidenced by the growing number of incidents reported in the press. To close all security loopholes from today's systems is infeasible, and no combination of technologies can prevent legitimate users from abusing their authority in a system; thus auditing is viewed as the last line of defense. This paper describes the use of such tools for detecting computer system intrusion and describes further technologies that may be of use for intrusion detection in the future.
引用
收藏
页码:405 / 418
相关论文
共 50 条
  • [41] A comparative study of techniques for intrusion detection
    Mukkamala, S
    Sung, AH
    15TH IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2003, : 570 - 577
  • [42] Brief analysis of intrusion detection techniques
    Qiong, Shi
    Zhen, Pan Guang
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 6588 - 6591
  • [43] Intrusion Detection Techniques for Virtual Domains
    Tupakula, Udaya
    Varadharajan, Vijay
    Dutta, Dipankar
    2012 19TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING (HIPC), 2012,
  • [44] Taxonomy and Survey of Collaborative Intrusion Detection
    Vasilomanolakis, Emmanouil
    Karuppayah, Shankar
    Muehlhaeuser, Max
    Fischer, Mathias
    ACM COMPUTING SURVEYS, 2015, 47 (04)
  • [45] Intrusion detection system for CubeSats: a survey
    Driouch, Otman
    Bah, Slimane
    Guennoun, Zouhair
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 596 - 601
  • [46] Swarm intelligence in intrusion detection: A survey
    Kolias, C.
    Kambourakis, G.
    Maragoudakis, M.
    COMPUTERS & SECURITY, 2011, 30 (08) : 625 - 642
  • [47] A Survey on Intrusion Detection and Prevention Systems
    Gupta N.
    Jindal V.
    Bedi P.
    SN Computer Science, 4 (5)
  • [48] A comprehensive survey on intrusion detection algorithms
    Li, Yang
    Li, Zhengming
    Li, Mengyao
    COMPUTERS & ELECTRICAL ENGINEERING, 2025, 121
  • [49] Survey of anomaly intrusion detection research
    Yang, Hong-Yu
    Zhu, Dan
    Xie, Feng
    Xie, Li-Xia
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (05): : 587 - 596
  • [50] A survey of intrusion detection in Internet of Things
    Zarpelao, Bruno Bogaz
    Miani, Rodrigo Sanches
    Kawakani, Claudio Toshio
    de Alvarenga, Sean Carlisto
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 84 : 25 - 37