Intrusion detection systems

被引:6
|
作者
机构
来源
关键词
Computer control systems - Computer crime - Computer simulation - Data acquisition - Data privacy - Data storage equipment;
D O I
10.1109/5254.956085
中图分类号
学科分类号
摘要
An intrusion is any set of actions that attempt to compromise a resource's integrity, confidentiality, or availability. The Common Intrusion Detection Framework provides a general architecture for intrusion detection systems.
引用
收藏
相关论文
共 50 条
  • [1] Intrusion detection systems - Introduction to intrusion detection and analysis
    Debar, H
    SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 161 - 177
  • [2] INTRUSION DETECTION SYSTEMS
    WILLIAMS, JD
    TRANSACTIONS OF THE AMERICAN NUCLEAR SOCIETY, 1979, 33 (NOV): : 733 - 734
  • [3] A Review on Intrusion Detection Techniques and Intrusion Detection systems in MANETS
    Chakravarthi, S. Sreenivasa
    Veluru, Suresh
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 730 - 737
  • [4] Intrusion detection: Systems and models
    Sherif, JS
    Dearmond, TG
    WET ICE 2002: ELEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2002, : 115 - 133
  • [5] Study of Intrusion Detection Systems
    Li-Chin Huang
    Min-Shiang Hwang
    Journal of Electronic Science and Technology, 2012, (03) : 269 - 275
  • [6] Intrusion detection systems as evidence
    Sommer, P
    COMPUTER NETWORKS, 1999, 31 (23-24) : 2477 - 2487
  • [7] Intrusion Detection in RFID Systems
    Thamilarasu, Geethapriya
    Sridhar, Ramalingam
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 1248 - 1254
  • [8] Study of intrusion detection systems
    Yonghui, Cao
    BioTechnology: An Indian Journal, 2013, 8 (10) : 1353 - 1356
  • [9] Evaluation of intrusion detection systems
    Ulvila, JW
    Gaffney, JE
    JOURNAL OF RESEARCH OF THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY, 2003, 108 (06): : 453 - 473
  • [10] A comparison of Intrusion Detection Systems
    Biermann, E
    Cloete, E
    Venter, LM
    COMPUTERS & SECURITY, 2001, 20 (08) : 676 - 683