Intrusion detection: Introduction to intrusion detection and security information management

被引:0
|
作者
Debar, H [1 ]
Viinikka, J [1 ]
机构
[1] France Telecom, Div R&D, F-14066 Caen 4, France
来源
FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III | 2005年 / 3655卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper covers intrusion detection and security information management technologies. It presents a primer on intrusion detection, focusing on data sources and analysis techniques. Data sources presented therein are classified according to the capture mechanism and we include an evaluation of the accuracy of these data sources. Analysis techniques are classified into misuse detection, using the explicit body of knowledge about security attacks to generate alerts, and anomaly detection, where the safe or normal operation of the monitored information system is described and alerts generated for anything that does not belong to that model. It then describes security information management and alert correlation technologies that are in use today. We particularly describe statistical modeling of alert flows and explicit correlation between alert information and vulnerability assessment information.
引用
收藏
页码:207 / 236
页数:30
相关论文
共 50 条
  • [1] Intrusion detection systems - Introduction to intrusion detection and analysis
    Debar, H
    SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 161 - 177
  • [2] Network and Information Security, and Intrusion Detection System Analysis
    Wu, Ying
    2013 INTERNATIONAL CONFERENCE ON EDUCATION AND EDUCATIONAL RESEARCH (EER 2013), 2013, 1 : 130 - 134
  • [3] Internet security and intrusion detection
    Kemmerer, RA
    Vigna, G
    25TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2003, : 748 - 749
  • [4] Security challenges in intrusion detection
    Jouad, Mohammed
    Diouani, Sara
    Houmani, Hanane
    Zaki, Ali
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 350 - 360
  • [5] Security configuration management in Intrusion Detection and Prevention Systems
    Alsubhi, K.
    Alhazmi, Y.
    Bouabdallah, N.
    Boutaba, R.
    International Journal of Security and Networks, 2012, 7 (01) : 30 - 39
  • [6] Intrusion-detection environment for information-security instruction
    Rowe, Neil C.
    Proceedings - Frontiers in Education Conference, 1999, 3 : 9 - 6
  • [7] Technical Analysis of Network Intrusion Detection System on the Information Security
    Yu, Sheng
    2015 3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCES RESEARCH (SSR 2015), 2015, 13 : 190 - 194
  • [8] The value of intrusion detection systems in information technology security architecture
    Cavusoglu, H
    Mishra, B
    Raghunathan, S
    INFORMATION SYSTEMS RESEARCH, 2005, 16 (01) : 28 - 46
  • [9] Intrusion and intrusion detection
    John McHugh
    International Journal of Information Security, 2001, 1 (1) : 14 - 35
  • [10] Security and Intrusion Detection on Critical SCADA Systems for Water Management
    Stoian, I.
    Ignat, S.
    Capatina, D.
    Ghiran, O.
    2014 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS, 2014,