Publication | Closed Access
Intrusion Detection: A Survey
175
Citations
10
References
2008
Year
Unknown Venue
Hardware SecurityEngineeringData MiningInformation SecurityThreat DetectionIntrusion Detection SystemIntrusion ToleranceIntrusion DetectionInformation ForensicsComputer ScienceBotnet DetectionRapid ProliferationIntrusion Detection SystemsData SecurityCryptographyNetwork Security
The rapid proliferation of computer networks has changed the prospect of network security. An easy accessibility condition cause computer networkpsilas vulnerable against several threats from hackers. Threats to networks are numerous and potentially devastating. Up to the moment, researchers have developed Intrusion Detection Systems (IDS) capable of detecting attacks in several available environments. A boundlessness of methods for misuse detection as well as anomaly detection has been applied. Many of the technologies proposed are complementary to each other, since for different kind of environments some approaches perform better than others. This paper presents a taxonomy of intrusion detection systems that is then used to survey and classify them. The taxonomy consists of the detection principle, and second of certain operational aspects of the intrusion detection system.
| Year | Citations | |
|---|---|---|
Page 1
Page 1