Intrusion detection techniques and approaches

被引:155
|
作者
Verwoerd, T [1 ]
Hunt, R [1 ]
机构
[1] Univ Canterbury, Dept Comp Sci, Christchurch 1, New Zealand
关键词
intrusion detection; probe technique; scanning; honeynet; worm/virus attack;
D O I
10.1016/S0140-3664(02)00037-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent security incidents and analysis have demonstrated that manual response to such attacks is no longer feasible. Intrusion detection systems (IDS) offer techniques for modelling and recognising normal and abusive system behaviour, Such methodologies include statistical models, immune system approaches, protocol verification, file and taint checking, neural networks, whitelisting, expression matching, state transition analysis, dedicated languages, genetic algorithms and burglar alarms. This paper describes these techniques including an IDS architectural outline and an analysis of IDS probe techniques finishing with a summary of associated technologies. (C) 2002 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:1356 / 1365
页数:10
相关论文
共 50 条
  • [21] Brief analysis of intrusion detection techniques
    Qiong, Shi
    Zhen, Pan Guang
    ISTM/2007: 7TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-7, CONFERENCE PROCEEDINGS, 2007, : 6588 - 6591
  • [22] Intrusion Detection Techniques for Virtual Domains
    Tupakula, Udaya
    Varadharajan, Vijay
    Dutta, Dipankar
    2012 19TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING (HIPC), 2012,
  • [23] Immune system approaches to intrusion detection - A review
    Kim J.
    Bentley P.J.
    Aickelin U.
    Greensmith J.
    Tedesco G.
    Twycross J.
    Natural Computing, 2007, 6 (4) : 413 - 466
  • [24] Analysis of Approaches to the Construction of Intrusion Detection Systems
    Nikolskaya, Kseniya Yu.
    Ivanov, Sergey A.
    Golodov, Valentin A.
    Mursalimov, Ainur I.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 82 - 83
  • [25] Efficient Approaches for Intrusion Detection in Cloud Environment
    Mishra, Preeti
    Pilli, Emmanuel S.
    Varadharajan, Vijay
    Tupakula, Udaya
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1211 - 1216
  • [26] A COMPREHENSIVE SURVEY ON APPROACHES TO INTRUSION DETECTION SYSTEM
    Deepa, A. J.
    Kavitha, V.
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 2063 - 2069
  • [27] Immune system approaches to intrusion detection - A review
    Aickelin, U
    Greensmith, J
    Twycross, J
    ARTIFICIAL IMMUNE SYSTEMS, PROCEEDINGS, 2004, 3239 : 316 - 329
  • [28] Enhancing Intrusion Detection Systems with Reinforcement Learning: A Comprehensive Survey of RL-based Approaches and Techniques
    Louati F.
    Ktata F.B.
    Amous I.
    SN Computer Science, 5 (6)
  • [29] Intrusion detection techniques for mobile wireless networks
    Zhang, YG
    Lee, WK
    Huang, YA
    WIRELESS NETWORKS, 2003, 9 (05) : 545 - 556
  • [30] Intrusion detection techniques in cloud environment: A survey
    Mishra, Preeti
    Pilli, Emmanuel S.
    Varadharajan, Vijay
    Tupakula, Udaya
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 : 18 - 47