Abstract
Intrusion Detection Systems (IDSs) play an important role in the defense strategy of site security officers. An IDS can act as a second line of defense to provide security analysts with the necessary insights into the nature of hostile activities. Therefore, a good understanding of IDSs helps administrators make informed decisions when it comes to choosing the right product for their systems. System programmers will appreciate a classification of the different IDS design and implementation approaches that highlight their practical use. One can never assess an intrusion detection system without knowing the performance measurements involved and the evaluations used to gauge these metrics. This chapter covers to a reasonable extent the above mentioned issues and draws some conclusions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
J. Ryan, M. Lin, R. Mikkulainen: Intrusion Detection with Neural Networks, Advances in Neural Information Processing Systems, Vol. 10 (MIT Press, Cambridge MA 1998)
A. Ghosh, A. Schwartzbard, M. Shatz: Learning Program Behavior Profiles for Intrusion Detection, Proc. 1st USENIX Workshop on Intrusion Detection and Network Monitoring (Santa Clara 1999)
S.L. Scott: A Bayesian paradigm for designing intrusion detection systems, Comput. Stat. Data Anal. 45(1), 69–83 (2004)
J.E. Dickerson, J. Juslin, O. Koukousoula, J.A. Dickerson: Fuzzy intrusion detection, Proc. IFSA World Congress and 20th NAFIPS International Conference (Vancouver 2001)
R. Sekar, Y. Guang, S. Verma, T. Shanbhag: A high-performance network intrusion detection system, Proc. 6th ACM Conference on Computer and Communication Security (Singapore 1999)
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou: Specification-based anomaly detection: A new approach for detecting network intrusions, ACM Computer and Communication Security Conference (CCS) (Washington DC 2002)
K. Ilgun, R.A. Kemmerer, P.A. Porras: State Transition Analysis: A Rule-Based Intrusion Detection Approach, IEEE Trans. Soft. Eng. 21(3), 181–199 (1995)
A. Pagnoni, A. Visconti: An innate immune system for the protection of computer networks, Proc. 4th Int. Symposium on Information and Communication Technologies (Cape Town 2005)
N.J. Puketza, K. Zhang, M. Chung, B. Mukherjee, R.A. Olsson: A Methodology for Testing Intrusion Detection Systems, IEEE Trans. Softw. Eng. 22(10), 719–729 (1996)
P. Mell, V. Hu, R. Lipmann, J. Haines, M. Zissman: An Overview of Issues in Testing Intrusion Detection Systems, Technical Report NIST IR 7007 (National Institute of Standard and Technology 2003), available http://csrc.nist.gov
D.J. Marchette: Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint (Springer, York, PA 2001), Chap. 3
M. Mahoney, P. Chan: An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection, Proc. 6th International Symposium, Recent Advances in Intrusion Detection (RAID’03) (Pittsburg 2003)
F. Massicotte, F. Gagnon, Y. Labiche, L. Briand, M. Coutre: Automatic Evaluation of Intrusion Detection Systems, Proc. 22nd Annual Computer Security Applications Conference (ACSAC’06) (Miami Beach 2006)
P.E. Proctor: The Practical Intrusion Detection Handbook (Prentice-Hall, Englewood Cliffs 2001) pp. 108–111
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Barry, B., Chan, H. (2010). Intrusion Detection Systems. In: Stavroulakis, P., Stamp, M. (eds) Handbook of Information and Communication Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04117-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-04117-4_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04116-7
Online ISBN: 978-3-642-04117-4
eBook Packages: EngineeringEngineering (R0)