Intrusion detection systems

被引:6
|
作者
机构
来源
关键词
Computer control systems - Computer crime - Computer simulation - Data acquisition - Data privacy - Data storage equipment;
D O I
10.1109/5254.956085
中图分类号
学科分类号
摘要
An intrusion is any set of actions that attempt to compromise a resource's integrity, confidentiality, or availability. The Common Intrusion Detection Framework provides a general architecture for intrusion detection systems.
引用
收藏
相关论文
共 50 条
  • [11] Intrusion Detection in Database Systems
    Javidi, Mohammad M.
    Sohrabi, Mina
    Rafsanjani, Marjan Kuchaki
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 93 - 101
  • [12] A Review on Recent Intrusion Detection Systems and Intrusion Prevention Systems in IoT
    Prajapati, Priteshkumar
    Bhatt, Bhumika
    Zalavadiya, Gautam
    Ajwalia, Madhav
    Shah, Parth
    2021 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2021), 2021, : 588 - 593
  • [13] Study of Intrusion Detection Systems
    LiChin Huang
    MinShiang Hwang
    Journal of Electronic Science and Technology, 2012, 10 (03) : 269 - 275
  • [14] An intrusion-tolerant mechanism for intrusion detection systems
    Kuang, Liwei
    Zulkernine, Mohammad
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 319 - +
  • [15] Adaptation techniques for intrusion detection and intrusion response systems
    Ragsdale, DJ
    Carver, CA
    Humphries, JW
    Pooch, UW
    SMC 2000 CONFERENCE PROCEEDINGS: 2000 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOL 1-5, 2000, : 2344 - 2349
  • [16] Quantitative intrusion intensity assessment for intrusion detection systems
    Kim, Dong Seong
    Lee, Sang Min
    Kim, Tae Hwan
    Park, Jong Sou
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (10) : 1199 - 1208
  • [17] Intrusion Detection Systems in Internet of Things
    Santos, Leonel
    Rabadao, Carlos
    Goncalves, Ramiro
    2018 13TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2018,
  • [18] Optimal Thresholds for Intrusion Detection Systems
    Laszka, Aron
    Abbas, Waseem
    Sastry, S. Shankar
    Vorobeychik, Yevgeniy
    Koutsoukos, Xenofon
    SYMPOSIUM AND BOOTCAMP ON THE SCIENCE OF SECURITY, 2016, : 72 - 81
  • [19] Hybrid Intrusion Detection in Information Systems
    Pierrot, David
    Harbi, Nouria
    Darmont, Jerome
    2016 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2014, : 27 - 31
  • [20] Intrusion Detection Systems in MANET: A Review
    Amiri, Ehsan
    Keshavarz, Hassan
    Heidari, Hossein
    Mohamadi, Esmaeil
    Moradzadeh, Hossein
    2ND INTERNATIONAL CONFERENCE ON INNOVATION, MANAGEMENT AND TECHNOLOGY RESEARCH, 2014, 129 : 453 - 459