Intrusion detection techniques and approaches

被引:155
|
作者
Verwoerd, T [1 ]
Hunt, R [1 ]
机构
[1] Univ Canterbury, Dept Comp Sci, Christchurch 1, New Zealand
关键词
intrusion detection; probe technique; scanning; honeynet; worm/virus attack;
D O I
10.1016/S0140-3664(02)00037-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion detection systems (IDS) offer techniques for modelling and recognising normal and abusive system behaviour, Such methodologies include statistical models, immune system approaches, protocol verification, file and taint checking, neural networks, whitelisting, expression matching, state transition analysis, dedicated languages, genetic algorithms and burglar alarms. This paper describes these techniques including an IDS architectural outline and an analysis of IDS probe techniques finishing with a summary of associated technologies. (C) 2002 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:1356 / 1365
页数:10
相关论文
共 50 条
  • [1] Approaches and Data Processing Techniques for Intrusion Detection Systems
    Srinivasu, Pakkurthi
    Avadhani, P. S.
    Korimilli, Vishal
    Ravipati, Prudhvi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (12): : 181 - 186
  • [2] A Review on Intrusion Detection Techniques and Intrusion Detection systems in MANETS
    Chakravarthi, S. Sreenivasa
    Veluru, Suresh
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 730 - 737
  • [3] Survey of intrusion detection techniques
    Lunt, Teresa F.
    Computers and Security, 1993, 12 (04): : 405 - 418
  • [4] Adaptation techniques for intrusion detection and intrusion response systems
    Ragsdale, DJ
    Carver, CA
    Humphries, JW
    Pooch, UW
    SMC 2000 CONFERENCE PROCEEDINGS: 2000 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOL 1-5, 2000, : 2344 - 2349
  • [5] Artificial intelligence approaches for intrusion detection
    Novikov, Dima
    Yampolskiy, Roman V.
    Reznik, Leon
    2006 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, 2006, : 23 - +
  • [6] Data mining approaches for intrusion detection
    Lee, W
    Stolfo, SJ
    PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, 1998, : 79 - 93
  • [7] Comparative Analysis of Intrusion Detection Approaches
    Ahmad, Iftikhar
    Abdullah, Azween B.
    Alghamdi, Abdullah S.
    2010 12TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2010, : 586 - 591
  • [8] Approaches and Challenges in Database Intrusion Detection
    Santos, Ricardo Jorge
    Bernardino, Jorge
    Vieira, Marco
    SIGMOD RECORD, 2014, 43 (03) : 36 - 47
  • [9] Artificial intelligent techniques for intrusion detection
    Mukkamala, S
    Sung, AH
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 1266 - 1271
  • [10] Methods and Techniques of Intrusion Detection: A Review
    Somya
    Bansal, Palak
    Ahmad, Tameem
    SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016, 2016, 628 : 518 - 529